Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
Typeebuild
Namespacedev-qt
Nameqtwebengine
Version5.15.12_p20240122
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version5.15.13_p20240322
Latest_non_vulnerable_version5.15.16_p20241115
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1pny-fvce-ubea
vulnerability_id VCID-1pny-fvce-ubea
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6508
reference_id
reference_type
scores
0
value 0.00684
scoring_system epss
scoring_elements 0.71614
published_at 2026-04-02T12:55:00Z
1
value 0.00684
scoring_system epss
scoring_elements 0.71632
published_at 2026-04-04T12:55:00Z
2
value 0.00684
scoring_system epss
scoring_elements 0.71605
published_at 2026-04-07T12:55:00Z
3
value 0.00684
scoring_system epss
scoring_elements 0.71645
published_at 2026-04-08T12:55:00Z
4
value 0.00684
scoring_system epss
scoring_elements 0.71656
published_at 2026-04-09T12:55:00Z
5
value 0.00684
scoring_system epss
scoring_elements 0.7168
published_at 2026-04-11T12:55:00Z
6
value 0.00684
scoring_system epss
scoring_elements 0.71663
published_at 2026-04-12T12:55:00Z
7
value 0.00684
scoring_system epss
scoring_elements 0.71644
published_at 2026-04-13T12:55:00Z
8
value 0.00684
scoring_system epss
scoring_elements 0.71688
published_at 2026-04-16T12:55:00Z
9
value 0.00684
scoring_system epss
scoring_elements 0.71694
published_at 2026-04-18T12:55:00Z
10
value 0.00684
scoring_system epss
scoring_elements 0.71675
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6508
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6508
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pny-fvce-ubea
1
url VCID-2cqy-bg4s-g3f4
vulnerability_id VCID-2cqy-bg4s-g3f4
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6350
reference_id
reference_type
scores
0
value 0.0124
scoring_system epss
scoring_elements 0.79199
published_at 2026-04-02T12:55:00Z
1
value 0.0124
scoring_system epss
scoring_elements 0.79223
published_at 2026-04-04T12:55:00Z
2
value 0.0124
scoring_system epss
scoring_elements 0.79207
published_at 2026-04-07T12:55:00Z
3
value 0.0124
scoring_system epss
scoring_elements 0.79233
published_at 2026-04-08T12:55:00Z
4
value 0.0124
scoring_system epss
scoring_elements 0.7924
published_at 2026-04-09T12:55:00Z
5
value 0.0124
scoring_system epss
scoring_elements 0.79265
published_at 2026-04-16T12:55:00Z
6
value 0.0124
scoring_system epss
scoring_elements 0.79249
published_at 2026-04-12T12:55:00Z
7
value 0.0124
scoring_system epss
scoring_elements 0.79238
published_at 2026-04-13T12:55:00Z
8
value 0.0124
scoring_system epss
scoring_elements 0.79261
published_at 2026-04-18T12:55:00Z
9
value 0.0124
scoring_system epss
scoring_elements 0.79262
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6350
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6350
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cqy-bg4s-g3f4
2
url VCID-2gjs-83hy-97e7
vulnerability_id VCID-2gjs-83hy-97e7
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0518
reference_id
reference_type
scores
0
value 0.00219
scoring_system epss
scoring_elements 0.44501
published_at 2026-04-21T12:55:00Z
1
value 0.00219
scoring_system epss
scoring_elements 0.44479
published_at 2026-04-07T12:55:00Z
2
value 0.00219
scoring_system epss
scoring_elements 0.4453
published_at 2026-04-08T12:55:00Z
3
value 0.00219
scoring_system epss
scoring_elements 0.44535
published_at 2026-04-09T12:55:00Z
4
value 0.00219
scoring_system epss
scoring_elements 0.44551
published_at 2026-04-11T12:55:00Z
5
value 0.00219
scoring_system epss
scoring_elements 0.44522
published_at 2026-04-12T12:55:00Z
6
value 0.00219
scoring_system epss
scoring_elements 0.44523
published_at 2026-04-13T12:55:00Z
7
value 0.00219
scoring_system epss
scoring_elements 0.44579
published_at 2026-04-16T12:55:00Z
8
value 0.00219
scoring_system epss
scoring_elements 0.4457
published_at 2026-04-18T12:55:00Z
9
value 0.00219
scoring_system epss
scoring_elements 0.4452
published_at 2026-04-02T12:55:00Z
10
value 0.00219
scoring_system epss
scoring_elements 0.44541
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0518
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0519
4
reference_url https://crbug.com/1507412
reference_id 1507412
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-17T04:00:16Z/
url https://crbug.com/1507412
5
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
6
reference_url https://security.gentoo.org/glsa/202402-23
reference_id GLSA-202402-23
reference_type
scores
url https://security.gentoo.org/glsa/202402-23
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/
reference_id IIUBRVICICWREJQUVT67RS7E4PVZQ5RS
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-17T04:00:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/
8
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
reference_id stable-channel-update-for-desktop_16.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-17T04:00:16Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/
reference_id TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-17T04:00:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2024-0518
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2gjs-83hy-97e7
3
url VCID-4ge9-qsks-n3fa
vulnerability_id VCID-4ge9-qsks-n3fa
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6512
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.65916
published_at 2026-04-02T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.65946
published_at 2026-04-04T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65912
published_at 2026-04-07T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65964
published_at 2026-04-08T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65976
published_at 2026-04-09T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65994
published_at 2026-04-11T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.65981
published_at 2026-04-12T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65952
published_at 2026-04-13T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65987
published_at 2026-04-16T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.66
published_at 2026-04-18T12:55:00Z
10
value 0.005
scoring_system epss
scoring_elements 0.65988
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6512
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
8
reference_url https://crbug.com/1457702
reference_id 1457702
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:50:41Z/
url https://crbug.com/1457702
9
reference_url https://www.debian.org/security/2023/dsa-5573
reference_id dsa-5573
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:50:41Z/
url https://www.debian.org/security/2023/dsa-5573
10
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/
reference_id MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:50:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/
reference_id RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:50:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/
13
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:50:41Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6512
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ge9-qsks-n3fa
4
url VCID-5ysr-aett-4kdn
vulnerability_id VCID-5ysr-aett-4kdn
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0517
reference_id
reference_type
scores
0
value 0.7313
scoring_system epss
scoring_elements 0.98786
published_at 2026-04-11T12:55:00Z
1
value 0.7313
scoring_system epss
scoring_elements 0.98794
published_at 2026-04-21T12:55:00Z
2
value 0.7313
scoring_system epss
scoring_elements 0.98792
published_at 2026-04-18T12:55:00Z
3
value 0.7313
scoring_system epss
scoring_elements 0.98788
published_at 2026-04-13T12:55:00Z
4
value 0.7313
scoring_system epss
scoring_elements 0.98787
published_at 2026-04-12T12:55:00Z
5
value 0.76486
scoring_system epss
scoring_elements 0.98929
published_at 2026-04-02T12:55:00Z
6
value 0.76486
scoring_system epss
scoring_elements 0.98931
published_at 2026-04-04T12:55:00Z
7
value 0.76486
scoring_system epss
scoring_elements 0.98934
published_at 2026-04-07T12:55:00Z
8
value 0.76486
scoring_system epss
scoring_elements 0.98936
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0517
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0519
4
reference_url https://crbug.com/1515930
reference_id 1515930
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-13T19:56:23Z/
url https://crbug.com/1515930
5
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
6
reference_url https://security.gentoo.org/glsa/202402-23
reference_id GLSA-202402-23
reference_type
scores
url https://security.gentoo.org/glsa/202402-23
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/
reference_id IIUBRVICICWREJQUVT67RS7E4PVZQ5RS
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-13T19:56:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/
8
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
reference_id stable-channel-update-for-desktop_16.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-13T19:56:23Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/
reference_id TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-13T19:56:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2024-0517
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5ysr-aett-4kdn
5
url VCID-6bdm-sdkv-6fh9
vulnerability_id VCID-6bdm-sdkv-6fh9
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6112
reference_id
reference_type
scores
0
value 0.22788
scoring_system epss
scoring_elements 0.95849
published_at 2026-04-02T12:55:00Z
1
value 0.22788
scoring_system epss
scoring_elements 0.9586
published_at 2026-04-07T12:55:00Z
2
value 0.22788
scoring_system epss
scoring_elements 0.95869
published_at 2026-04-08T12:55:00Z
3
value 0.22788
scoring_system epss
scoring_elements 0.95872
published_at 2026-04-09T12:55:00Z
4
value 0.22788
scoring_system epss
scoring_elements 0.95876
published_at 2026-04-11T12:55:00Z
5
value 0.22788
scoring_system epss
scoring_elements 0.95875
published_at 2026-04-12T12:55:00Z
6
value 0.22788
scoring_system epss
scoring_elements 0.95877
published_at 2026-04-13T12:55:00Z
7
value 0.22788
scoring_system epss
scoring_elements 0.95889
published_at 2026-04-16T12:55:00Z
8
value 0.22788
scoring_system epss
scoring_elements 0.95894
published_at 2026-04-18T12:55:00Z
9
value 0.22788
scoring_system epss
scoring_elements 0.95896
published_at 2026-04-21T12:55:00Z
10
value 0.22788
scoring_system epss
scoring_elements 0.95857
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6112
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5997
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6112
3
reference_url https://crbug.com/1499298
reference_id 1499298
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://crbug.com/1499298
4
reference_url http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html
reference_id Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html
5
reference_url https://www.debian.org/security/2023/dsa-5556
reference_id dsa-5556
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://www.debian.org/security/2023/dsa-5556
6
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://security.gentoo.org/glsa/202311-11
7
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://security.gentoo.org/glsa/202312-07
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/
reference_id JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/
reference_id MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/
11
reference_url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/
reference_id XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.10_p20230623
purl pkg:ebuild/dev-qt/qtwebengine@5.15.10_p20230623
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.10_p20230623
1
url pkg:ebuild/dev-qt/qtwebengine@5.15.11_p20231120
purl pkg:ebuild/dev-qt/qtwebengine@5.15.11_p20231120
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.11_p20231120
2
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6112
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bdm-sdkv-6fh9
6
url VCID-9czp-wct7-8qa7
vulnerability_id VCID-9czp-wct7-8qa7
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6703
reference_id
reference_type
scores
0
value 0.00337
scoring_system epss
scoring_elements 0.56569
published_at 2026-04-02T12:55:00Z
1
value 0.00337
scoring_system epss
scoring_elements 0.5659
published_at 2026-04-04T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.56568
published_at 2026-04-07T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.5662
published_at 2026-04-08T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.56624
published_at 2026-04-09T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56633
published_at 2026-04-11T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56609
published_at 2026-04-12T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56587
published_at 2026-04-13T12:55:00Z
8
value 0.00337
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-16T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56617
published_at 2026-04-18T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.56588
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6703
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6703
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9czp-wct7-8qa7
7
url VCID-e1u4-ngv9-1qb3
vulnerability_id VCID-e1u4-ngv9-1qb3
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0222
reference_id
reference_type
scores
0
value 0.00443
scoring_system epss
scoring_elements 0.63375
published_at 2026-04-18T12:55:00Z
1
value 0.00443
scoring_system epss
scoring_elements 0.63352
published_at 2026-04-21T12:55:00Z
2
value 0.0056
scoring_system epss
scoring_elements 0.68214
published_at 2026-04-02T12:55:00Z
3
value 0.0056
scoring_system epss
scoring_elements 0.68233
published_at 2026-04-04T12:55:00Z
4
value 0.0056
scoring_system epss
scoring_elements 0.68209
published_at 2026-04-07T12:55:00Z
5
value 0.0056
scoring_system epss
scoring_elements 0.6826
published_at 2026-04-08T12:55:00Z
6
value 0.0056
scoring_system epss
scoring_elements 0.68275
published_at 2026-04-09T12:55:00Z
7
value 0.0056
scoring_system epss
scoring_elements 0.683
published_at 2026-04-11T12:55:00Z
8
value 0.0056
scoring_system epss
scoring_elements 0.68288
published_at 2026-04-12T12:55:00Z
9
value 0.0056
scoring_system epss
scoring_elements 0.68254
published_at 2026-04-13T12:55:00Z
10
value 0.0056
scoring_system epss
scoring_elements 0.68294
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0222
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
5
reference_url https://crbug.com/1501798
reference_id 1501798
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:52:28Z/
url https://crbug.com/1501798
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
reference_id AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:52:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
reference_id D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:52:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
9
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:52:28Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2024-0222
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1u4-ngv9-1qb3
8
url VCID-ebdk-y5fy-xufp
vulnerability_id VCID-ebdk-y5fy-xufp
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0333
reference_id
reference_type
scores
0
value 0.00074
scoring_system epss
scoring_elements 0.22579
published_at 2026-04-02T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22622
published_at 2026-04-04T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22409
published_at 2026-04-07T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.2249
published_at 2026-04-08T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22545
published_at 2026-04-09T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22563
published_at 2026-04-11T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22522
published_at 2026-04-12T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22468
published_at 2026-04-13T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22483
published_at 2026-04-16T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.2248
published_at 2026-04-18T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22429
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0333
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0333
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0333
2
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
3
reference_url https://security.gentoo.org/glsa/202402-23
reference_id GLSA-202402-23
reference_type
scores
url https://security.gentoo.org/glsa/202402-23
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2024-0333
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ebdk-y5fy-xufp
9
url VCID-ej1p-hynu-bkcg
vulnerability_id VCID-ej1p-hynu-bkcg
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6347
reference_id
reference_type
scores
0
value 0.00368
scoring_system epss
scoring_elements 0.58672
published_at 2026-04-07T12:55:00Z
1
value 0.00368
scoring_system epss
scoring_elements 0.58683
published_at 2026-04-02T12:55:00Z
2
value 0.00368
scoring_system epss
scoring_elements 0.58743
published_at 2026-04-16T12:55:00Z
3
value 0.00368
scoring_system epss
scoring_elements 0.5871
published_at 2026-04-13T12:55:00Z
4
value 0.00368
scoring_system epss
scoring_elements 0.58749
published_at 2026-04-11T12:55:00Z
5
value 0.00368
scoring_system epss
scoring_elements 0.5873
published_at 2026-04-12T12:55:00Z
6
value 0.00368
scoring_system epss
scoring_elements 0.58723
published_at 2026-04-08T12:55:00Z
7
value 0.00368
scoring_system epss
scoring_elements 0.58705
published_at 2026-04-04T12:55:00Z
8
value 0.00368
scoring_system epss
scoring_elements 0.58726
published_at 2026-04-21T12:55:00Z
9
value 0.00368
scoring_system epss
scoring_elements 0.58747
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6347
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://crbug.com/1494461
reference_id 1494461
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://crbug.com/1494461
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/
reference_id 6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/
reference_id C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/
10
reference_url https://www.debian.org/security/2023/dsa-5569
reference_id dsa-5569
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://www.debian.org/security/2023/dsa-5569
11
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
12
reference_url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
reference_id stable-channel-update-for-desktop_28.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/
reference_id UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6347
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ej1p-hynu-bkcg
10
url VCID-fkv2-fxnb-efh3
vulnerability_id VCID-fkv2-fxnb-efh3
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6346
reference_id
reference_type
scores
0
value 0.00356
scoring_system epss
scoring_elements 0.57888
published_at 2026-04-02T12:55:00Z
1
value 0.00356
scoring_system epss
scoring_elements 0.57908
published_at 2026-04-04T12:55:00Z
2
value 0.00356
scoring_system epss
scoring_elements 0.57883
published_at 2026-04-07T12:55:00Z
3
value 0.00356
scoring_system epss
scoring_elements 0.57938
published_at 2026-04-08T12:55:00Z
4
value 0.00356
scoring_system epss
scoring_elements 0.5794
published_at 2026-04-09T12:55:00Z
5
value 0.00356
scoring_system epss
scoring_elements 0.57956
published_at 2026-04-11T12:55:00Z
6
value 0.00356
scoring_system epss
scoring_elements 0.57933
published_at 2026-04-12T12:55:00Z
7
value 0.00356
scoring_system epss
scoring_elements 0.57913
published_at 2026-04-13T12:55:00Z
8
value 0.00356
scoring_system epss
scoring_elements 0.57944
published_at 2026-04-16T12:55:00Z
9
value 0.00356
scoring_system epss
scoring_elements 0.57942
published_at 2026-04-18T12:55:00Z
10
value 0.00356
scoring_system epss
scoring_elements 0.5792
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6346
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6346
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkv2-fxnb-efh3
11
url VCID-k3n7-zdsw-eyg6
vulnerability_id VCID-k3n7-zdsw-eyg6
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6706
reference_id
reference_type
scores
0
value 0.00337
scoring_system epss
scoring_elements 0.56588
published_at 2026-04-21T12:55:00Z
1
value 0.00337
scoring_system epss
scoring_elements 0.56569
published_at 2026-04-02T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.56568
published_at 2026-04-07T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.5662
published_at 2026-04-08T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.56624
published_at 2026-04-09T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56633
published_at 2026-04-11T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56609
published_at 2026-04-12T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56587
published_at 2026-04-13T12:55:00Z
8
value 0.00337
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-16T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56617
published_at 2026-04-18T12:55:00Z
10
value 0.00337
scoring_system epss
scoring_elements 0.5659
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6706
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1500921
reference_id 1500921
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/
url https://crbug.com/1500921
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6706
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3n7-zdsw-eyg6
12
url VCID-nx63-bqh3-8fes
vulnerability_id VCID-nx63-bqh3-8fes
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6351
reference_id
reference_type
scores
0
value 0.0021
scoring_system epss
scoring_elements 0.43377
published_at 2026-04-02T12:55:00Z
1
value 0.0021
scoring_system epss
scoring_elements 0.43405
published_at 2026-04-04T12:55:00Z
2
value 0.0021
scoring_system epss
scoring_elements 0.43343
published_at 2026-04-07T12:55:00Z
3
value 0.0021
scoring_system epss
scoring_elements 0.43394
published_at 2026-04-08T12:55:00Z
4
value 0.0021
scoring_system epss
scoring_elements 0.43408
published_at 2026-04-09T12:55:00Z
5
value 0.0021
scoring_system epss
scoring_elements 0.43427
published_at 2026-04-11T12:55:00Z
6
value 0.0021
scoring_system epss
scoring_elements 0.43396
published_at 2026-04-12T12:55:00Z
7
value 0.0021
scoring_system epss
scoring_elements 0.4338
published_at 2026-04-13T12:55:00Z
8
value 0.0021
scoring_system epss
scoring_elements 0.43439
published_at 2026-04-16T12:55:00Z
9
value 0.0021
scoring_system epss
scoring_elements 0.43428
published_at 2026-04-18T12:55:00Z
10
value 0.0021
scoring_system epss
scoring_elements 0.43362
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6351
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6351
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nx63-bqh3-8fes
13
url VCID-p3y5-dg2h-5yfp
vulnerability_id VCID-p3y5-dg2h-5yfp
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-7024
reference_id
reference_type
scores
0
value 0.01298
scoring_system epss
scoring_elements 0.79689
published_at 2026-04-04T12:55:00Z
1
value 0.01298
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-02T12:55:00Z
2
value 0.02866
scoring_system epss
scoring_elements 0.86241
published_at 2026-04-08T12:55:00Z
3
value 0.02866
scoring_system epss
scoring_elements 0.8626
published_at 2026-04-13T12:55:00Z
4
value 0.02866
scoring_system epss
scoring_elements 0.86264
published_at 2026-04-12T12:55:00Z
5
value 0.02866
scoring_system epss
scoring_elements 0.86266
published_at 2026-04-11T12:55:00Z
6
value 0.02866
scoring_system epss
scoring_elements 0.86222
published_at 2026-04-07T12:55:00Z
7
value 0.02866
scoring_system epss
scoring_elements 0.86252
published_at 2026-04-09T12:55:00Z
8
value 0.02866
scoring_system epss
scoring_elements 0.86273
published_at 2026-04-21T12:55:00Z
9
value 0.02866
scoring_system epss
scoring_elements 0.8628
published_at 2026-04-18T12:55:00Z
10
value 0.02866
scoring_system epss
scoring_elements 0.86275
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-7024
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7024
2
reference_url https://crbug.com/1513170
reference_id 1513170
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-23T05:01:04Z/
url https://crbug.com/1513170
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3/
reference_id 6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-23T05:01:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3/
4
reference_url https://www.debian.org/security/2023/dsa-5585
reference_id dsa-5585
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-23T05:01:04Z/
url https://www.debian.org/security/2023/dsa-5585
5
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
6
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html
reference_id stable-channel-update-for-desktop_20.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-23T05:01:04Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR/
reference_id U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-23T05:01:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR/
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-7024
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3y5-dg2h-5yfp
14
url VCID-pm77-zumu-r7ff
vulnerability_id VCID-pm77-zumu-r7ff
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6511
reference_id
reference_type
scores
0
value 0.00202
scoring_system epss
scoring_elements 0.42229
published_at 2026-04-21T12:55:00Z
1
value 0.00202
scoring_system epss
scoring_elements 0.4234
published_at 2026-04-11T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.42304
published_at 2026-04-12T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-13T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42326
published_at 2026-04-16T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42302
published_at 2026-04-18T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.42289
published_at 2026-04-02T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42317
published_at 2026-04-04T12:55:00Z
8
value 0.00202
scoring_system epss
scoring_elements 0.42259
published_at 2026-04-07T12:55:00Z
9
value 0.00202
scoring_system epss
scoring_elements 0.4231
published_at 2026-04-08T12:55:00Z
10
value 0.00202
scoring_system epss
scoring_elements 0.42318
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6511
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
8
reference_url https://crbug.com/1478613
reference_id 1478613
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-07T19:21:57Z/
url https://crbug.com/1478613
9
reference_url https://www.debian.org/security/2023/dsa-5573
reference_id dsa-5573
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-07T19:21:57Z/
url https://www.debian.org/security/2023/dsa-5573
10
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/
reference_id MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-07T19:21:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/
reference_id RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-07T19:21:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/
13
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-07T19:21:57Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6511
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pm77-zumu-r7ff
15
url VCID-qga5-mtb2-8ubc
vulnerability_id VCID-qga5-mtb2-8ubc
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6509
reference_id
reference_type
scores
0
value 0.00927
scoring_system epss
scoring_elements 0.76
published_at 2026-04-02T12:55:00Z
1
value 0.00927
scoring_system epss
scoring_elements 0.76032
published_at 2026-04-04T12:55:00Z
2
value 0.00927
scoring_system epss
scoring_elements 0.76011
published_at 2026-04-07T12:55:00Z
3
value 0.00927
scoring_system epss
scoring_elements 0.76044
published_at 2026-04-08T12:55:00Z
4
value 0.00927
scoring_system epss
scoring_elements 0.76059
published_at 2026-04-09T12:55:00Z
5
value 0.00927
scoring_system epss
scoring_elements 0.76084
published_at 2026-04-11T12:55:00Z
6
value 0.00927
scoring_system epss
scoring_elements 0.7606
published_at 2026-04-12T12:55:00Z
7
value 0.00927
scoring_system epss
scoring_elements 0.76058
published_at 2026-04-13T12:55:00Z
8
value 0.00927
scoring_system epss
scoring_elements 0.76098
published_at 2026-04-16T12:55:00Z
9
value 0.00927
scoring_system epss
scoring_elements 0.76102
published_at 2026-04-18T12:55:00Z
10
value 0.00927
scoring_system epss
scoring_elements 0.76086
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6509
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6509
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qga5-mtb2-8ubc
16
url VCID-qpfk-bgrf-wbhn
vulnerability_id VCID-qpfk-bgrf-wbhn
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6345
reference_id
reference_type
scores
0
value 0.0072
scoring_system epss
scoring_elements 0.72434
published_at 2026-04-02T12:55:00Z
1
value 0.0072
scoring_system epss
scoring_elements 0.72452
published_at 2026-04-04T12:55:00Z
2
value 0.0072
scoring_system epss
scoring_elements 0.72428
published_at 2026-04-07T12:55:00Z
3
value 0.0072
scoring_system epss
scoring_elements 0.72467
published_at 2026-04-08T12:55:00Z
4
value 0.0072
scoring_system epss
scoring_elements 0.7248
published_at 2026-04-09T12:55:00Z
5
value 0.0072
scoring_system epss
scoring_elements 0.72502
published_at 2026-04-11T12:55:00Z
6
value 0.0072
scoring_system epss
scoring_elements 0.72485
published_at 2026-04-12T12:55:00Z
7
value 0.0072
scoring_system epss
scoring_elements 0.72475
published_at 2026-04-13T12:55:00Z
8
value 0.0072
scoring_system epss
scoring_elements 0.72517
published_at 2026-04-16T12:55:00Z
9
value 0.0072
scoring_system epss
scoring_elements 0.72526
published_at 2026-04-18T12:55:00Z
10
value 0.0072
scoring_system epss
scoring_elements 0.72515
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6345
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://crbug.com/1505053
reference_id 1505053
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://crbug.com/1505053
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/
reference_id 6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/
reference_id C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/
10
reference_url https://www.debian.org/security/2023/dsa-5569
reference_id dsa-5569
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://www.debian.org/security/2023/dsa-5569
11
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
12
reference_url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
reference_id stable-channel-update-for-desktop_28.html
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/
reference_id UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6345
risk_score 10.0
exploitability 2.0
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfk-bgrf-wbhn
17
url VCID-sfh6-1fwg-p3af
vulnerability_id VCID-sfh6-1fwg-p3af
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6348
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69658
published_at 2026-04-18T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.69623
published_at 2026-04-12T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.6961
published_at 2026-04-13T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.69649
published_at 2026-04-16T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.696
published_at 2026-04-08T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69616
published_at 2026-04-09T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.69639
published_at 2026-04-21T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.75163
published_at 2026-04-04T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.7514
published_at 2026-04-07T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.75133
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6348
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6348
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sfh6-1fwg-p3af
18
url VCID-t92z-ygnk-qyb2
vulnerability_id VCID-t92z-ygnk-qyb2
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6510
reference_id
reference_type
scores
0
value 0.00927
scoring_system epss
scoring_elements 0.76
published_at 2026-04-02T12:55:00Z
1
value 0.00927
scoring_system epss
scoring_elements 0.76032
published_at 2026-04-04T12:55:00Z
2
value 0.00927
scoring_system epss
scoring_elements 0.76011
published_at 2026-04-07T12:55:00Z
3
value 0.00927
scoring_system epss
scoring_elements 0.76044
published_at 2026-04-08T12:55:00Z
4
value 0.00927
scoring_system epss
scoring_elements 0.76059
published_at 2026-04-09T12:55:00Z
5
value 0.00927
scoring_system epss
scoring_elements 0.76084
published_at 2026-04-11T12:55:00Z
6
value 0.00927
scoring_system epss
scoring_elements 0.7606
published_at 2026-04-12T12:55:00Z
7
value 0.00927
scoring_system epss
scoring_elements 0.76058
published_at 2026-04-13T12:55:00Z
8
value 0.00927
scoring_system epss
scoring_elements 0.76098
published_at 2026-04-16T12:55:00Z
9
value 0.00927
scoring_system epss
scoring_elements 0.76102
published_at 2026-04-18T12:55:00Z
10
value 0.00927
scoring_system epss
scoring_elements 0.76086
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6510
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6510
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t92z-ygnk-qyb2
19
url VCID-wj64-fbxb-37hz
vulnerability_id VCID-wj64-fbxb-37hz
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0225
reference_id
reference_type
scores
0
value 0.00643
scoring_system epss
scoring_elements 0.7067
published_at 2026-04-18T12:55:00Z
1
value 0.00643
scoring_system epss
scoring_elements 0.70649
published_at 2026-04-21T12:55:00Z
2
value 0.00811
scoring_system epss
scoring_elements 0.74185
published_at 2026-04-07T12:55:00Z
3
value 0.00811
scoring_system epss
scoring_elements 0.74213
published_at 2026-04-04T12:55:00Z
4
value 0.00811
scoring_system epss
scoring_elements 0.74218
published_at 2026-04-08T12:55:00Z
5
value 0.00811
scoring_system epss
scoring_elements 0.74233
published_at 2026-04-09T12:55:00Z
6
value 0.00811
scoring_system epss
scoring_elements 0.74254
published_at 2026-04-11T12:55:00Z
7
value 0.00811
scoring_system epss
scoring_elements 0.74236
published_at 2026-04-12T12:55:00Z
8
value 0.00811
scoring_system epss
scoring_elements 0.74229
published_at 2026-04-13T12:55:00Z
9
value 0.00811
scoring_system epss
scoring_elements 0.74266
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0225
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
5
reference_url https://crbug.com/1506923
reference_id 1506923
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:53:43Z/
url https://crbug.com/1506923
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
reference_id AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:53:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
reference_id D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:53:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
9
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:53:43Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2024-0225
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wj64-fbxb-37hz
20
url VCID-wpbx-88g6-fub2
vulnerability_id VCID-wpbx-88g6-fub2
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0224
reference_id
reference_type
scores
0
value 0.00447
scoring_system epss
scoring_elements 0.6356
published_at 2026-04-18T12:55:00Z
1
value 0.00447
scoring_system epss
scoring_elements 0.63545
published_at 2026-04-21T12:55:00Z
2
value 0.00565
scoring_system epss
scoring_elements 0.6838
published_at 2026-04-02T12:55:00Z
3
value 0.00565
scoring_system epss
scoring_elements 0.68399
published_at 2026-04-04T12:55:00Z
4
value 0.00565
scoring_system epss
scoring_elements 0.68375
published_at 2026-04-07T12:55:00Z
5
value 0.00565
scoring_system epss
scoring_elements 0.68426
published_at 2026-04-08T12:55:00Z
6
value 0.00565
scoring_system epss
scoring_elements 0.68443
published_at 2026-04-09T12:55:00Z
7
value 0.00565
scoring_system epss
scoring_elements 0.6847
published_at 2026-04-11T12:55:00Z
8
value 0.00565
scoring_system epss
scoring_elements 0.68457
published_at 2026-04-12T12:55:00Z
9
value 0.00565
scoring_system epss
scoring_elements 0.68425
published_at 2026-04-13T12:55:00Z
10
value 0.00565
scoring_system epss
scoring_elements 0.68463
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0224
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
5
reference_url https://crbug.com/1505086
reference_id 1505086
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:51:02Z/
url https://crbug.com/1505086
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
reference_id AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:51:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
reference_id D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:51:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
9
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:51:02Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2024-0224
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpbx-88g6-fub2
21
url VCID-x8dh-sm6j-n7gd
vulnerability_id VCID-x8dh-sm6j-n7gd
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6705
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.58
published_at 2026-04-21T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.57966
published_at 2026-04-02T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57961
published_at 2026-04-07T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.58017
published_at 2026-04-08T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58019
published_at 2026-04-09T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58036
published_at 2026-04-11T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.58014
published_at 2026-04-12T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.57994
published_at 2026-04-13T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.58024
published_at 2026-04-16T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.58023
published_at 2026-04-18T12:55:00Z
10
value 0.00357
scoring_system epss
scoring_elements 0.57985
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6705
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1505708
reference_id 1505708
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/
url https://crbug.com/1505708
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6705
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8dh-sm6j-n7gd
22
url VCID-xccw-1usp-u3c8
vulnerability_id VCID-xccw-1usp-u3c8
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6704
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.4028
published_at 2026-04-21T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40373
published_at 2026-04-02T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40398
published_at 2026-04-11T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.4036
published_at 2026-04-12T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40341
published_at 2026-04-13T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40386
published_at 2026-04-16T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40356
published_at 2026-04-18T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40399
published_at 2026-04-04T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40324
published_at 2026-04-07T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40375
published_at 2026-04-08T12:55:00Z
10
value 0.00186
scoring_system epss
scoring_elements 0.40387
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6704
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://crbug.com/1504792
reference_id 1504792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T16:55:55Z/
url https://crbug.com/1504792
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T16:55:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
10
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
11
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T16:55:55Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6704
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xccw-1usp-u3c8
23
url VCID-y2u9-49qt-a3e6
vulnerability_id VCID-y2u9-49qt-a3e6
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6702
reference_id
reference_type
scores
0
value 0.51688
scoring_system epss
scoring_elements 0.97907
published_at 2026-04-18T12:55:00Z
1
value 0.51688
scoring_system epss
scoring_elements 0.97882
published_at 2026-04-02T12:55:00Z
2
value 0.51688
scoring_system epss
scoring_elements 0.97883
published_at 2026-04-04T12:55:00Z
3
value 0.51688
scoring_system epss
scoring_elements 0.97887
published_at 2026-04-07T12:55:00Z
4
value 0.51688
scoring_system epss
scoring_elements 0.97891
published_at 2026-04-08T12:55:00Z
5
value 0.51688
scoring_system epss
scoring_elements 0.97894
published_at 2026-04-09T12:55:00Z
6
value 0.51688
scoring_system epss
scoring_elements 0.97897
published_at 2026-04-11T12:55:00Z
7
value 0.51688
scoring_system epss
scoring_elements 0.97898
published_at 2026-04-12T12:55:00Z
8
value 0.51688
scoring_system epss
scoring_elements 0.97899
published_at 2026-04-13T12:55:00Z
9
value 0.51688
scoring_system epss
scoring_elements 0.97906
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6702
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1501326
reference_id 1501326
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/
url https://crbug.com/1501326
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6702
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y2u9-49qt-a3e6
24
url VCID-y3w7-8syq-s3gv
vulnerability_id VCID-y3w7-8syq-s3gv
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0223
reference_id
reference_type
scores
0
value 0.09619
scoring_system epss
scoring_elements 0.92904
published_at 2026-04-21T12:55:00Z
1
value 0.09619
scoring_system epss
scoring_elements 0.92869
published_at 2026-04-02T12:55:00Z
2
value 0.09619
scoring_system epss
scoring_elements 0.92872
published_at 2026-04-04T12:55:00Z
3
value 0.09619
scoring_system epss
scoring_elements 0.9287
published_at 2026-04-07T12:55:00Z
4
value 0.09619
scoring_system epss
scoring_elements 0.92878
published_at 2026-04-08T12:55:00Z
5
value 0.09619
scoring_system epss
scoring_elements 0.92883
published_at 2026-04-09T12:55:00Z
6
value 0.09619
scoring_system epss
scoring_elements 0.92888
published_at 2026-04-11T12:55:00Z
7
value 0.09619
scoring_system epss
scoring_elements 0.92886
published_at 2026-04-12T12:55:00Z
8
value 0.09619
scoring_system epss
scoring_elements 0.92887
published_at 2026-04-13T12:55:00Z
9
value 0.09619
scoring_system epss
scoring_elements 0.92897
published_at 2026-04-16T12:55:00Z
10
value 0.09619
scoring_system epss
scoring_elements 0.92899
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0223
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
5
reference_url https://crbug.com/1505009
reference_id 1505009
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:48:46Z/
url https://crbug.com/1505009
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
reference_id AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:48:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
reference_id D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:48:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
9
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:48:46Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2024-0223
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y3w7-8syq-s3gv
25
url VCID-ypjx-fn18-9kba
vulnerability_id VCID-ypjx-fn18-9kba
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6707
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.66351
published_at 2026-04-18T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66268
published_at 2026-04-02T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66294
published_at 2026-04-04T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66264
published_at 2026-04-07T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66311
published_at 2026-04-08T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.66324
published_at 2026-04-09T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.66344
published_at 2026-04-11T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66332
published_at 2026-04-12T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.66301
published_at 2026-04-13T12:55:00Z
9
value 0.00508
scoring_system epss
scoring_elements 0.66336
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6707
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1504036
reference_id 1504036
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:28Z/
url https://crbug.com/1504036
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:28Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-6707
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ypjx-fn18-9kba
26
url VCID-yw95-nnx5-efg6
vulnerability_id VCID-yw95-nnx5-efg6
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0519
reference_id
reference_type
scores
0
value 0.00142
scoring_system epss
scoring_elements 0.34431
published_at 2026-04-21T12:55:00Z
1
value 0.00142
scoring_system epss
scoring_elements 0.34544
published_at 2026-04-02T12:55:00Z
2
value 0.00142
scoring_system epss
scoring_elements 0.34571
published_at 2026-04-04T12:55:00Z
3
value 0.00142
scoring_system epss
scoring_elements 0.34439
published_at 2026-04-07T12:55:00Z
4
value 0.00142
scoring_system epss
scoring_elements 0.34482
published_at 2026-04-08T12:55:00Z
5
value 0.00142
scoring_system epss
scoring_elements 0.34511
published_at 2026-04-09T12:55:00Z
6
value 0.00142
scoring_system epss
scoring_elements 0.34512
published_at 2026-04-11T12:55:00Z
7
value 0.00142
scoring_system epss
scoring_elements 0.34473
published_at 2026-04-12T12:55:00Z
8
value 0.00142
scoring_system epss
scoring_elements 0.34449
published_at 2026-04-13T12:55:00Z
9
value 0.00142
scoring_system epss
scoring_elements 0.34485
published_at 2026-04-16T12:55:00Z
10
value 0.00142
scoring_system epss
scoring_elements 0.3447
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0519
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0518
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0519
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0519
4
reference_url https://crbug.com/1517354
reference_id 1517354
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-18T20:18:46Z/
url https://crbug.com/1517354
5
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
6
reference_url https://security.gentoo.org/glsa/202402-23
reference_id GLSA-202402-23
reference_type
scores
url https://security.gentoo.org/glsa/202402-23
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/
reference_id IIUBRVICICWREJQUVT67RS7E4PVZQ5RS
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-18T20:18:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IIUBRVICICWREJQUVT67RS7E4PVZQ5RS/
8
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
reference_id stable-channel-update-for-desktop_16.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-18T20:18:46Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_16.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/
reference_id TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-18T20:18:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TNN4SO5UI3U3Q6ASTVT6WMZ4723FYDLH/
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2024-0519
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yw95-nnx5-efg6
27
url VCID-zdxx-gvsz-9fca
vulnerability_id VCID-zdxx-gvsz-9fca
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5997
reference_id
reference_type
scores
0
value 0.00403
scoring_system epss
scoring_elements 0.60896
published_at 2026-04-21T12:55:00Z
1
value 0.00403
scoring_system epss
scoring_elements 0.60811
published_at 2026-04-07T12:55:00Z
2
value 0.00403
scoring_system epss
scoring_elements 0.6086
published_at 2026-04-08T12:55:00Z
3
value 0.00403
scoring_system epss
scoring_elements 0.60876
published_at 2026-04-09T12:55:00Z
4
value 0.00403
scoring_system epss
scoring_elements 0.60898
published_at 2026-04-11T12:55:00Z
5
value 0.00403
scoring_system epss
scoring_elements 0.60884
published_at 2026-04-12T12:55:00Z
6
value 0.00403
scoring_system epss
scoring_elements 0.60865
published_at 2026-04-13T12:55:00Z
7
value 0.00403
scoring_system epss
scoring_elements 0.60907
published_at 2026-04-16T12:55:00Z
8
value 0.00403
scoring_system epss
scoring_elements 0.60912
published_at 2026-04-18T12:55:00Z
9
value 0.00403
scoring_system epss
scoring_elements 0.60819
published_at 2026-04-02T12:55:00Z
10
value 0.00403
scoring_system epss
scoring_elements 0.60847
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5997
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5997
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6112
3
reference_url https://crbug.com/1497997
reference_id 1497997
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://crbug.com/1497997
4
reference_url https://www.debian.org/security/2023/dsa-5556
reference_id dsa-5556
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://www.debian.org/security/2023/dsa-5556
5
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://security.gentoo.org/glsa/202311-11
6
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://security.gentoo.org/glsa/202312-07
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/
reference_id JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/
reference_id MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/
10
reference_url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/
reference_id XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/
fixed_packages
0
url pkg:ebuild/dev-qt/qtwebengine@5.15.10_p20230623
purl pkg:ebuild/dev-qt/qtwebengine@5.15.10_p20230623
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.10_p20230623
1
url pkg:ebuild/dev-qt/qtwebengine@5.15.11_p20231120
purl pkg:ebuild/dev-qt/qtwebengine@5.15.11_p20231120
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.11_p20231120
2
url pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
purl pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122
aliases CVE-2023-5997
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdxx-gvsz-9fca
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.12_p20240122