Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
Typeapk
Namespacealpine
Nameqt5-qtwebengine
Version5.15.13-r1
Qualifiers
arch armv7
distroversion v3.18
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.15.13-r2
Latest_non_vulnerable_version5.15.13-r13
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-3u71-42dp-abat
vulnerability_id VCID-3u71-42dp-abat
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2033
reference_id
reference_type
scores
0
value 0.23261
scoring_system epss
scoring_elements 0.95931
published_at 2026-04-07T12:55:00Z
1
value 0.23261
scoring_system epss
scoring_elements 0.95919
published_at 2026-04-02T12:55:00Z
2
value 0.23261
scoring_system epss
scoring_elements 0.95948
published_at 2026-04-13T12:55:00Z
3
value 0.23261
scoring_system epss
scoring_elements 0.95945
published_at 2026-04-12T12:55:00Z
4
value 0.23261
scoring_system epss
scoring_elements 0.95942
published_at 2026-04-09T12:55:00Z
5
value 0.23261
scoring_system epss
scoring_elements 0.95927
published_at 2026-04-04T12:55:00Z
6
value 0.23261
scoring_system epss
scoring_elements 0.9594
published_at 2026-04-08T12:55:00Z
7
value 0.25181
scoring_system epss
scoring_elements 0.96192
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2033
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2033
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2033
2
reference_url https://crbug.com/1432210
reference_id 1432210
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T16:29:34Z/
url https://crbug.com/1432210
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/
reference_id 4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T16:29:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/
4
reference_url https://www.debian.org/security/2023/dsa-5390
reference_id dsa-5390
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T16:29:34Z/
url https://www.debian.org/security/2023/dsa-5390
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/
reference_id ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T16:29:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/
reference_id FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T16:29:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/
7
reference_url https://security.gentoo.org/glsa/202309-17
reference_id GLSA-202309-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T16:29:34Z/
url https://security.gentoo.org/glsa/202309-17
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/
reference_id IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T16:29:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/
reference_id RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T16:29:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/
reference_id SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T16:29:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/
11
reference_url https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T16:29:34Z/
url https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_14.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2023-2033
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3u71-42dp-abat
1
url VCID-btz8-5qak-qkgp
vulnerability_id VCID-btz8-5qak-qkgp
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1811
reference_id
reference_type
scores
0
value 0.00534
scoring_system epss
scoring_elements 0.67366
published_at 2026-04-07T12:55:00Z
1
value 0.00534
scoring_system epss
scoring_elements 0.67442
published_at 2026-04-16T12:55:00Z
2
value 0.00534
scoring_system epss
scoring_elements 0.67407
published_at 2026-04-13T12:55:00Z
3
value 0.00534
scoring_system epss
scoring_elements 0.6744
published_at 2026-04-12T12:55:00Z
4
value 0.00534
scoring_system epss
scoring_elements 0.67453
published_at 2026-04-11T12:55:00Z
5
value 0.00534
scoring_system epss
scoring_elements 0.67432
published_at 2026-04-09T12:55:00Z
6
value 0.00534
scoring_system epss
scoring_elements 0.67418
published_at 2026-04-08T12:55:00Z
7
value 0.00704
scoring_system epss
scoring_elements 0.72031
published_at 2026-04-02T12:55:00Z
8
value 0.00704
scoring_system epss
scoring_elements 0.72051
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1811
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1810
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1811
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1812
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1814
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1815
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1816
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1818
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1819
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1820
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1821
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1821
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1822
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1823
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2311
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2313
17
reference_url https://crbug.com/1420510
reference_id 1420510
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:49:29Z/
url https://crbug.com/1420510
18
reference_url https://www.debian.org/security/2023/dsa-5386
reference_id dsa-5386
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:49:29Z/
url https://www.debian.org/security/2023/dsa-5386
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/
reference_id FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:49:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/
20
reference_url https://security.gentoo.org/glsa/202309-17
reference_id GLSA-202309-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:49:29Z/
url https://security.gentoo.org/glsa/202309-17
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/
reference_id HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:49:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/
22
reference_url https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:49:29Z/
url https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
23
reference_url https://usn.ubuntu.com/6021-1/
reference_id USN-6021-1
reference_type
scores
url https://usn.ubuntu.com/6021-1/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2023-1811
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-btz8-5qak-qkgp
2
url VCID-edfj-wxgp-bbb6
vulnerability_id VCID-edfj-wxgp-bbb6
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-1810
reference_id
reference_type
scores
0
value 0.00809
scoring_system epss
scoring_elements 0.74165
published_at 2026-04-07T12:55:00Z
1
value 0.00809
scoring_system epss
scoring_elements 0.74247
published_at 2026-04-16T12:55:00Z
2
value 0.00809
scoring_system epss
scoring_elements 0.74209
published_at 2026-04-13T12:55:00Z
3
value 0.00809
scoring_system epss
scoring_elements 0.74217
published_at 2026-04-12T12:55:00Z
4
value 0.00809
scoring_system epss
scoring_elements 0.74235
published_at 2026-04-11T12:55:00Z
5
value 0.00809
scoring_system epss
scoring_elements 0.74213
published_at 2026-04-09T12:55:00Z
6
value 0.00809
scoring_system epss
scoring_elements 0.74198
published_at 2026-04-08T12:55:00Z
7
value 0.01064
scoring_system epss
scoring_elements 0.77629
published_at 2026-04-02T12:55:00Z
8
value 0.01064
scoring_system epss
scoring_elements 0.77656
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-1810
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1810
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1810
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1811
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1812
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1812
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1813
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1814
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1814
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1815
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1816
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1818
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1819
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1820
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1821
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1821
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1822
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1822
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1823
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2311
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2311
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2313
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2313
17
reference_url https://crbug.com/1414018
reference_id 1414018
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:46:40Z/
url https://crbug.com/1414018
18
reference_url https://www.debian.org/security/2023/dsa-5386
reference_id dsa-5386
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:46:40Z/
url https://www.debian.org/security/2023/dsa-5386
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/
reference_id FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:46:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FG3CRADL7IL5IHK4NCHG4LAYLKHFXETX/
20
reference_url https://security.gentoo.org/glsa/202309-17
reference_id GLSA-202309-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:46:40Z/
url https://security.gentoo.org/glsa/202309-17
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/
reference_id HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:46:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HO3QZY4UQFP4XNF43ILMVVOABMB7KAQ5/
22
reference_url https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-08T18:46:40Z/
url https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop.html
23
reference_url https://usn.ubuntu.com/6021-1/
reference_id USN-6021-1
reference_type
scores
url https://usn.ubuntu.com/6021-1/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2023-1810
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-edfj-wxgp-bbb6
3
url VCID-w19a-2915-q7hv
vulnerability_id VCID-w19a-2915-q7hv
summary Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2137
reference_id
reference_type
scores
0
value 0.00455
scoring_system epss
scoring_elements 0.63843
published_at 2026-04-04T12:55:00Z
1
value 0.00455
scoring_system epss
scoring_elements 0.63818
published_at 2026-04-02T12:55:00Z
2
value 0.00455
scoring_system epss
scoring_elements 0.63871
published_at 2026-04-16T12:55:00Z
3
value 0.00455
scoring_system epss
scoring_elements 0.63836
published_at 2026-04-13T12:55:00Z
4
value 0.00455
scoring_system epss
scoring_elements 0.63883
published_at 2026-04-11T12:55:00Z
5
value 0.00455
scoring_system epss
scoring_elements 0.63869
published_at 2026-04-12T12:55:00Z
6
value 0.00455
scoring_system epss
scoring_elements 0.63852
published_at 2026-04-08T12:55:00Z
7
value 0.00455
scoring_system epss
scoring_elements 0.63801
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2137
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2134
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2134
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2135
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2135
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2136
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2137
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2137
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://crbug.com/1430644
reference_id 1430644
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:07:53Z/
url https://crbug.com/1430644
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/
reference_id 4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:07:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4AOSGAOPXLBK4A5ZRTVZ4M6QKVLSWMWG/
9
reference_url https://www.debian.org/security/2023/dsa-5393
reference_id dsa-5393
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:07:53Z/
url https://www.debian.org/security/2023/dsa-5393
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/
reference_id ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:07:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ES2CDRHR2Y4WY6DNDIAPYZFXJU3ZBFAV/
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/
reference_id FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:07:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FEJZMAUB4XP44HSHEBDWEKFGA7DUHY42/
12
reference_url https://security.gentoo.org/glsa/202309-17
reference_id GLSA-202309-17
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:07:53Z/
url https://security.gentoo.org/glsa/202309-17
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/
reference_id IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:07:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IHHD6KNH4WLUE6JG6HRQZWNAJMHJ32X7/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/
reference_id RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:07:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJQI63HWZFL6M26Q6UOHKDY6LD2PFC5Z/
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/
reference_id SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:07:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SLO7BL2MHZYPY6O3OAEAQL3SKYMGGO6M/
16
reference_url https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html
reference_id stable-channel-update-for-desktop_18.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-03T19:07:53Z/
url https://chromereleases.googleblog.com/2023/04/stable-channel-update-for-desktop_18.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2023-2137
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w19a-2915-q7hv
4
url VCID-x9ej-7dcq-tub2
vulnerability_id VCID-x9ej-7dcq-tub2
summary
Double Free
An issue was discovered in libxml2 before 2.10.4. When hashing empty dict strings in a crafted XML document, xmlDictComputeFastKey in dict.c can produce non-deterministic values, leading to various logic and memory errors, such as a double free. This behavior occurs because there is an attempt to use the first byte of an empty string, and any value is possible (not solely the '\0' value).
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29469.json
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-29469.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-29469
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.2209
published_at 2026-04-02T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.21959
published_at 2026-04-16T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.2214
published_at 2026-04-04T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.2191
published_at 2026-04-07T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.21991
published_at 2026-04-08T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22046
published_at 2026-04-09T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22061
published_at 2026-04-11T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.2202
published_at 2026-04-12T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.2196
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-29469
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28484
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-29469
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.9
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/issues/510
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T21:02:27Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/issues/510
6
reference_url https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T21:02:27Z/
url https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.4
7
reference_url https://lists.debian.org/debian-lts-announce/2023/04/msg00031.html
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T21:02:27Z/
url https://lists.debian.org/debian-lts-announce/2023/04/msg00031.html
8
reference_url https://nokogiri.org/CHANGELOG.html#1143-2023-04-11
reference_id
reference_type
scores
url https://nokogiri.org/CHANGELOG.html#1143-2023-04-11
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034437
reference_id 1034437
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1034437
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2185984
reference_id 2185984
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2185984
11
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-29469
reference_id CVE-2023-29469
reference_type
scores
url https://nvd.nist.gov/vuln/detail/CVE-2023-29469
12
reference_url https://security.gentoo.org/glsa/202402-11
reference_id GLSA-202402-11
reference_type
scores
url https://security.gentoo.org/glsa/202402-11
13
reference_url https://security.netapp.com/advisory/ntap-20230601-0006/
reference_id ntap-20230601-0006
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T21:02:27Z/
url https://security.netapp.com/advisory/ntap-20230601-0006/
14
reference_url https://access.redhat.com/errata/RHSA-2023:4349
reference_id RHSA-2023:4349
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4349
15
reference_url https://access.redhat.com/errata/RHSA-2023:4529
reference_id RHSA-2023:4529
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4529
16
reference_url https://access.redhat.com/errata/RHSA-2023:4628
reference_id RHSA-2023:4628
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4628
17
reference_url https://access.redhat.com/errata/RHSA-2024:0413
reference_id RHSA-2024:0413
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:0413
18
reference_url https://usn.ubuntu.com/6028-1/
reference_id USN-6028-1
reference_type
scores
url https://usn.ubuntu.com/6028-1/
19
reference_url https://usn.ubuntu.com/6028-2/
reference_id USN-6028-2
reference_type
scores
url https://usn.ubuntu.com/6028-2/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1?arch=armv7&distroversion=v3.18&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1%3Farch=armv7&distroversion=v3.18&reponame=community
aliases CVE-2023-29469
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x9ej-7dcq-tub2
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.13-r1%3Farch=armv7&distroversion=v3.18&reponame=community