Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/476952?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/476952?format=api", "purl": "pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2?arch=armhf&distroversion=v3.22&reponame=community", "type": "apk", "namespace": "alpine", "name": "qt6-qtwebengine", "version": "6.6.3-r2", "qualifiers": { "arch": "armhf", "distroversion": "v3.22", "reponame": "community" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "6.6.3-r3", "latest_non_vulnerable_version": "6.8.3-r6", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59086?format=api", "vulnerability_id": "VCID-a9md-7mxf-kkdb", "summary": "Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2625", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.71985", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.71981", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00701", "scoring_system": "epss", "scoring_elements": "0.72005", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76313", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76317", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76339", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76312", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76298", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76358", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00945", "scoring_system": "epss", "scoring_elements": "0.76353", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01354", "scoring_system": "epss", "scoring_elements": "0.80145", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2625" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2625", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2625" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/", "reference_id": "2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:24:07Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/" }, { "reference_url": "https://issues.chromium.org/issues/327740539", "reference_id": "327740539", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:24:07Z/" } ], "url": "https://issues.chromium.org/issues/327740539" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/", "reference_id": "6JINDYFB3MPH43ECTI72BV63K4RXSG22", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:24:07Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/", "reference_id": "AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:24:07Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/" }, { "reference_url": "https://security.gentoo.org/glsa/202412-05", "reference_id": "GLSA-202412-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-05" }, { "reference_url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html", "reference_id": "stable-channel-update-for-desktop_19.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:24:07Z/" } ], "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/476952?format=api", "purl": "pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2?arch=armhf&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2%3Farch=armhf&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2024-2625" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-a9md-7mxf-kkdb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96102?format=api", "vulnerability_id": "VCID-bpey-jwmy-hbcx", "summary": "Heap buffer overflow in ANGLE in Google Chrome prior to 123.0.6312.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3516", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68387", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68312", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68331", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68308", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68359", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68375", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68402", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.6839", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68357", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68396", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00563", "scoring_system": "epss", "scoring_elements": "0.68409", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3516" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3516", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3516" }, { "reference_url": "https://issues.chromium.org/issues/328859176", "reference_id": "328859176", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:10Z/" } ], "url": "https://issues.chromium.org/issues/328859176" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/", "reference_id": "5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/", "reference_id": "EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/", "reference_id": "NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:10Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/" }, { "reference_url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html", "reference_id": "stable-channel-update-for-desktop_10.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:10Z/" } ], "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/476952?format=api", "purl": "pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2?arch=armhf&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2%3Farch=armhf&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2024-3516" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bpey-jwmy-hbcx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59102?format=api", "vulnerability_id": "VCID-cbcv-2prm-rygz", "summary": "Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3159", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90981", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90949", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90958", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90957", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90982", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.9098", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90911", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90921", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90932", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.06301", "scoring_system": "epss", "scoring_elements": "0.90943", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3159" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3159", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3159" }, { "reference_url": "https://issues.chromium.org/issues/330760873", "reference_id": "330760873", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-11T04:01:32Z/" } ], "url": "https://issues.chromium.org/issues/330760873" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/", "reference_id": "EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-11T04:01:32Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/" }, { "reference_url": "https://security.gentoo.org/glsa/202412-05", "reference_id": "GLSA-202412-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-05" }, { "reference_url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html", "reference_id": "stable-channel-update-for-desktop.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-11T04:01:32Z/" } ], "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/476952?format=api", "purl": "pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2?arch=armhf&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2%3Farch=armhf&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2024-3159" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cbcv-2prm-rygz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59098?format=api", "vulnerability_id": "VCID-fkyq-rccj-fuan", "summary": "Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2887", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.03715", "scoring_system": "epss", "scoring_elements": "0.87973", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.03715", "scoring_system": "epss", "scoring_elements": "0.87946", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.03715", "scoring_system": "epss", "scoring_elements": "0.87966", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.03715", "scoring_system": "epss", "scoring_elements": "0.87976", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.03715", "scoring_system": "epss", "scoring_elements": "0.87984", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88839", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.04295", "scoring_system": "epss", "scoring_elements": "0.88823", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.04919", "scoring_system": "epss", "scoring_elements": "0.8963", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.04919", "scoring_system": "epss", "scoring_elements": "0.89629", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.08547", "scoring_system": "epss", "scoring_elements": "0.92411", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2887" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2887", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2887" }, { "reference_url": "https://issues.chromium.org/issues/330588502", "reference_id": "330588502", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-04T04:00:11Z/" } ], "url": "https://issues.chromium.org/issues/330588502" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/", "reference_id": "3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-04T04:00:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/", "reference_id": "G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-04T04:00:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/" }, { "reference_url": "https://security.gentoo.org/glsa/202412-05", "reference_id": "GLSA-202412-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-05" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/", "reference_id": "IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-04T04:00:11Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/" }, { "reference_url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html", "reference_id": "stable-channel-update-for-desktop_26.html", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Track*", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-04T04:00:11Z/" } ], "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/476952?format=api", "purl": "pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2?arch=armhf&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2%3Farch=armhf&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2024-2887" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyq-rccj-fuan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/96072?format=api", "vulnerability_id": "VCID-n12n-mxuw-3ke8", "summary": "Out of bounds memory access in Compositing in Google Chrome prior to 123.0.6312.122 allowed a remote attacker who had compromised the GPU process to potentially perform a sandbox escape via specific UI gestures. (Chromium security severity: High)", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3157", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.676", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67534", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67555", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67533", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67585", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67598", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67621", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67607", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67574", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67609", "published_at": "2026-04-16T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-3157" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3157", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3157" }, { "reference_url": "https://issues.chromium.org/issues/331237485", "reference_id": "331237485", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:09Z/" } ], "url": "https://issues.chromium.org/issues/331237485" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/", "reference_id": "5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/", "reference_id": "EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/", "reference_id": "NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:09Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/" }, { "reference_url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html", "reference_id": "stable-channel-update-for-desktop_10.html", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:09Z/" } ], "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/476952?format=api", "purl": "pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2?arch=armhf&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2%3Farch=armhf&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2024-3157" ], "risk_score": 3.6, "exploitability": "0.5", "weighted_severity": "7.3", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n12n-mxuw-3ke8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/59089?format=api", "vulnerability_id": "VCID-ya5r-nz1z-23gw", "summary": "Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.", "references": [ { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2626", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.32024", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31912", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31899", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31933", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31972", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.3194", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31888", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.32065", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35821", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-2626" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2626", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2626" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/", "reference_id": "2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T16:27:53Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/" }, { "reference_url": "https://issues.chromium.org/issues/40945098", "reference_id": "40945098", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T16:27:53Z/" } ], "url": "https://issues.chromium.org/issues/40945098" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/", "reference_id": "6JINDYFB3MPH43ECTI72BV63K4RXSG22", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T16:27:53Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/", "reference_id": "AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T16:27:53Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/" }, { "reference_url": "https://security.gentoo.org/glsa/202412-05", "reference_id": "GLSA-202412-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-05" }, { "reference_url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html", "reference_id": "stable-channel-update-for-desktop_19.html", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T16:27:53Z/" } ], "url": "https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/476952?format=api", "purl": "pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2?arch=armhf&distroversion=v3.22&reponame=community", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2%3Farch=armhf&distroversion=v3.22&reponame=community" } ], "aliases": [ "CVE-2024-2626" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ya5r-nz1z-23gw" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.3-r2%3Farch=armhf&distroversion=v3.22&reponame=community" }