Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/www-client/microsoft-edge@120.0.6099.109
Typeebuild
Namespacewww-client
Namemicrosoft-edge
Version120.0.6099.109
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version121.0.2277.83
Latest_non_vulnerable_version141.0.7390.107
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-179c-4v5w-1qe3
vulnerability_id VCID-179c-4v5w-1qe3
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2939
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.06178
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06209
published_at 2026-04-04T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06191
published_at 2026-04-07T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.06233
published_at 2026-04-08T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.06272
published_at 2026-04-09T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06261
published_at 2026-04-11T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.06257
published_at 2026-04-12T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06247
published_at 2026-04-13T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06206
published_at 2026-04-16T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06217
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2939
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1427431
reference_id 1427431
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:00Z/
url https://crbug.com/1427431
16
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:00Z/
url https://www.debian.org/security/2023/dsa-5418
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:00Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:00Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2939
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-179c-4v5w-1qe3
1
url VCID-1e7a-d4a9-x3hu
vulnerability_id VCID-1e7a-d4a9-x3hu
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5481
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.50178
published_at 2026-04-02T12:55:00Z
1
value 0.00267
scoring_system epss
scoring_elements 0.50206
published_at 2026-04-12T12:55:00Z
2
value 0.00267
scoring_system epss
scoring_elements 0.50156
published_at 2026-04-07T12:55:00Z
3
value 0.00267
scoring_system epss
scoring_elements 0.5021
published_at 2026-04-08T12:55:00Z
4
value 0.00267
scoring_system epss
scoring_elements 0.50204
published_at 2026-04-09T12:55:00Z
5
value 0.00267
scoring_system epss
scoring_elements 0.50232
published_at 2026-04-11T12:55:00Z
6
value 0.00267
scoring_system epss
scoring_elements 0.50194
published_at 2026-04-13T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50239
published_at 2026-04-16T12:55:00Z
8
value 0.00267
scoring_system epss
scoring_elements 0.5024
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5481
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
16
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5481
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1e7a-d4a9-x3hu
2
url VCID-1m8z-3b3h-5qaz
vulnerability_id VCID-1m8z-3b3h-5qaz
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5186
reference_id
reference_type
scores
0
value 0.0122
scoring_system epss
scoring_elements 0.79023
published_at 2026-04-02T12:55:00Z
1
value 0.0122
scoring_system epss
scoring_elements 0.79049
published_at 2026-04-04T12:55:00Z
2
value 0.0122
scoring_system epss
scoring_elements 0.79034
published_at 2026-04-07T12:55:00Z
3
value 0.0122
scoring_system epss
scoring_elements 0.79059
published_at 2026-04-08T12:55:00Z
4
value 0.0122
scoring_system epss
scoring_elements 0.79066
published_at 2026-04-13T12:55:00Z
5
value 0.0122
scoring_system epss
scoring_elements 0.7909
published_at 2026-04-11T12:55:00Z
6
value 0.0122
scoring_system epss
scoring_elements 0.79076
published_at 2026-04-12T12:55:00Z
7
value 0.0122
scoring_system epss
scoring_elements 0.79094
published_at 2026-04-16T12:55:00Z
8
value 0.0122
scoring_system epss
scoring_elements 0.79091
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5186
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5186
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5187
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5186
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1m8z-3b3h-5qaz
3
url VCID-1pny-fvce-ubea
vulnerability_id VCID-1pny-fvce-ubea
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6508
reference_id
reference_type
scores
0
value 0.00684
scoring_system epss
scoring_elements 0.71614
published_at 2026-04-02T12:55:00Z
1
value 0.00684
scoring_system epss
scoring_elements 0.71632
published_at 2026-04-04T12:55:00Z
2
value 0.00684
scoring_system epss
scoring_elements 0.71605
published_at 2026-04-07T12:55:00Z
3
value 0.00684
scoring_system epss
scoring_elements 0.71645
published_at 2026-04-08T12:55:00Z
4
value 0.00684
scoring_system epss
scoring_elements 0.71656
published_at 2026-04-09T12:55:00Z
5
value 0.00684
scoring_system epss
scoring_elements 0.7168
published_at 2026-04-11T12:55:00Z
6
value 0.00684
scoring_system epss
scoring_elements 0.71663
published_at 2026-04-12T12:55:00Z
7
value 0.00684
scoring_system epss
scoring_elements 0.71644
published_at 2026-04-13T12:55:00Z
8
value 0.00684
scoring_system epss
scoring_elements 0.71688
published_at 2026-04-16T12:55:00Z
9
value 0.00684
scoring_system epss
scoring_elements 0.71694
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6508
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6508
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1pny-fvce-ubea
4
url VCID-1rx9-ptfn-akb3
vulnerability_id VCID-1rx9-ptfn-akb3
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5858
reference_id
reference_type
scores
0
value 0.00707
scoring_system epss
scoring_elements 0.72124
published_at 2026-04-02T12:55:00Z
1
value 0.00707
scoring_system epss
scoring_elements 0.72144
published_at 2026-04-04T12:55:00Z
2
value 0.00707
scoring_system epss
scoring_elements 0.72122
published_at 2026-04-07T12:55:00Z
3
value 0.00707
scoring_system epss
scoring_elements 0.72159
published_at 2026-04-08T12:55:00Z
4
value 0.00707
scoring_system epss
scoring_elements 0.72171
published_at 2026-04-09T12:55:00Z
5
value 0.00707
scoring_system epss
scoring_elements 0.72193
published_at 2026-04-11T12:55:00Z
6
value 0.00707
scoring_system epss
scoring_elements 0.72177
published_at 2026-04-12T12:55:00Z
7
value 0.00707
scoring_system epss
scoring_elements 0.72163
published_at 2026-04-13T12:55:00Z
8
value 0.00707
scoring_system epss
scoring_elements 0.72205
published_at 2026-04-16T12:55:00Z
9
value 0.00707
scoring_system epss
scoring_elements 0.72213
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5858
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://crbug.com/1457704
reference_id 1457704
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:35:38Z/
url https://crbug.com/1457704
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
reference_id 2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:35:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
20
reference_url https://www.debian.org/security/2023/dsa-5546
reference_id dsa-5546
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:35:38Z/
url https://www.debian.org/security/2023/dsa-5546
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
reference_id EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:35:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
22
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:35:38Z/
url https://security.gentoo.org/glsa/202311-11
23
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:35:38Z/
url https://security.gentoo.org/glsa/202312-07
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
reference_id PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:35:38Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
25
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
reference_id stable-channel-update-for-desktop_31.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-12T14:35:38Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5858
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1rx9-ptfn-akb3
5
url VCID-1u6x-paqa-kkbq
vulnerability_id VCID-1u6x-paqa-kkbq
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5474
reference_id
reference_type
scores
0
value 0.00787
scoring_system epss
scoring_elements 0.73854
published_at 2026-04-11T12:55:00Z
1
value 0.00787
scoring_system epss
scoring_elements 0.73791
published_at 2026-04-02T12:55:00Z
2
value 0.00787
scoring_system epss
scoring_elements 0.7387
published_at 2026-04-16T12:55:00Z
3
value 0.00787
scoring_system epss
scoring_elements 0.73828
published_at 2026-04-13T12:55:00Z
4
value 0.00787
scoring_system epss
scoring_elements 0.73836
published_at 2026-04-12T12:55:00Z
5
value 0.00787
scoring_system epss
scoring_elements 0.73814
published_at 2026-04-04T12:55:00Z
6
value 0.00787
scoring_system epss
scoring_elements 0.73784
published_at 2026-04-07T12:55:00Z
7
value 0.00787
scoring_system epss
scoring_elements 0.73819
published_at 2026-04-08T12:55:00Z
8
value 0.00787
scoring_system epss
scoring_elements 0.73832
published_at 2026-04-09T12:55:00Z
9
value 0.00787
scoring_system epss
scoring_elements 0.73879
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5474
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://crbug.com/1483194
reference_id 1483194
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/
url https://crbug.com/1483194
16
reference_url https://www.debian.org/security/2023/dsa-5526
reference_id dsa-5526
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/
url https://www.debian.org/security/2023/dsa-5526
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/
url https://security.gentoo.org/glsa/202312-07
19
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
reference_id stable-channel-update-for-desktop_10.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:20Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5474
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1u6x-paqa-kkbq
6
url VCID-1xsp-qxcx-13fu
vulnerability_id VCID-1xsp-qxcx-13fu
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3735
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.40062
published_at 2026-04-18T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40019
published_at 2026-04-07T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40072
published_at 2026-04-08T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40086
published_at 2026-04-09T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40096
published_at 2026-04-11T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.4006
published_at 2026-04-12T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-13T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.40091
published_at 2026-04-16T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40071
published_at 2026-04-02T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40097
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3735
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
14
reference_url https://crbug.com/1394410
reference_id 1394410
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:41:58Z/
url https://crbug.com/1394410
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
reference_id PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:41:58Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
16
reference_url https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-09T13:41:58Z/
url https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3735
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xsp-qxcx-13fu
7
url VCID-285f-nx9c-yqga
vulnerability_id VCID-285f-nx9c-yqga
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5478
reference_id
reference_type
scores
0
value 0.00203
scoring_system epss
scoring_elements 0.42383
published_at 2026-04-02T12:55:00Z
1
value 0.00203
scoring_system epss
scoring_elements 0.42413
published_at 2026-04-04T12:55:00Z
2
value 0.00203
scoring_system epss
scoring_elements 0.42352
published_at 2026-04-07T12:55:00Z
3
value 0.00203
scoring_system epss
scoring_elements 0.42401
published_at 2026-04-08T12:55:00Z
4
value 0.00203
scoring_system epss
scoring_elements 0.42408
published_at 2026-04-09T12:55:00Z
5
value 0.00203
scoring_system epss
scoring_elements 0.42431
published_at 2026-04-11T12:55:00Z
6
value 0.00203
scoring_system epss
scoring_elements 0.42395
published_at 2026-04-12T12:55:00Z
7
value 0.00203
scoring_system epss
scoring_elements 0.42366
published_at 2026-04-13T12:55:00Z
8
value 0.00203
scoring_system epss
scoring_elements 0.42415
published_at 2026-04-16T12:55:00Z
9
value 0.00203
scoring_system epss
scoring_elements 0.4239
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5478
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
16
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5478
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-285f-nx9c-yqga
8
url VCID-2ate-hte1-rucf
vulnerability_id VCID-2ate-hte1-rucf
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5218
reference_id
reference_type
scores
0
value 0.00257
scoring_system epss
scoring_elements 0.49074
published_at 2026-04-13T12:55:00Z
1
value 0.00257
scoring_system epss
scoring_elements 0.49046
published_at 2026-04-02T12:55:00Z
2
value 0.00257
scoring_system epss
scoring_elements 0.49116
published_at 2026-04-18T12:55:00Z
3
value 0.00257
scoring_system epss
scoring_elements 0.49119
published_at 2026-04-16T12:55:00Z
4
value 0.00257
scoring_system epss
scoring_elements 0.49067
published_at 2026-04-12T12:55:00Z
5
value 0.00257
scoring_system epss
scoring_elements 0.49095
published_at 2026-04-11T12:55:00Z
6
value 0.00257
scoring_system epss
scoring_elements 0.49078
published_at 2026-04-09T12:55:00Z
7
value 0.00257
scoring_system epss
scoring_elements 0.49082
published_at 2026-04-08T12:55:00Z
8
value 0.00257
scoring_system epss
scoring_elements 0.49027
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5218
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://crbug.com/1487110
reference_id 1487110
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:23Z/
url https://crbug.com/1487110
16
reference_url https://www.debian.org/security/2023/dsa-5526
reference_id dsa-5526
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:23Z/
url https://www.debian.org/security/2023/dsa-5526
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/
reference_id F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/F5QCMP6KKWPDZZLFU7YXSZDHEKOE7BXO/
18
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:23Z/
url https://security.gentoo.org/glsa/202311-11
19
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:23Z/
url https://security.gentoo.org/glsa/202312-07
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/
reference_id M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/
21
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
reference_id stable-channel-update-for-desktop_10.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:23Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5218
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2ate-hte1-rucf
9
url VCID-2cqy-bg4s-g3f4
vulnerability_id VCID-2cqy-bg4s-g3f4
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6350
reference_id
reference_type
scores
0
value 0.0124
scoring_system epss
scoring_elements 0.79199
published_at 2026-04-02T12:55:00Z
1
value 0.0124
scoring_system epss
scoring_elements 0.79223
published_at 2026-04-04T12:55:00Z
2
value 0.0124
scoring_system epss
scoring_elements 0.79207
published_at 2026-04-07T12:55:00Z
3
value 0.0124
scoring_system epss
scoring_elements 0.79233
published_at 2026-04-08T12:55:00Z
4
value 0.0124
scoring_system epss
scoring_elements 0.7924
published_at 2026-04-09T12:55:00Z
5
value 0.0124
scoring_system epss
scoring_elements 0.79265
published_at 2026-04-16T12:55:00Z
6
value 0.0124
scoring_system epss
scoring_elements 0.79249
published_at 2026-04-12T12:55:00Z
7
value 0.0124
scoring_system epss
scoring_elements 0.79238
published_at 2026-04-13T12:55:00Z
8
value 0.0124
scoring_system epss
scoring_elements 0.79261
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6350
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6350
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2cqy-bg4s-g3f4
10
url VCID-2e1g-esu2-6kby
vulnerability_id VCID-2e1g-esu2-6kby
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5483
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.2949
published_at 2026-04-02T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29538
published_at 2026-04-04T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29359
published_at 2026-04-07T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29423
published_at 2026-04-08T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29465
published_at 2026-04-09T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29469
published_at 2026-04-11T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29424
published_at 2026-04-12T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29371
published_at 2026-04-13T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29392
published_at 2026-04-16T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29367
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5483
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
16
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5483
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2e1g-esu2-6kby
11
url VCID-2fqk-vzr3-euex
vulnerability_id VCID-2fqk-vzr3-euex
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4074
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.63035
published_at 2026-04-02T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.63063
published_at 2026-04-04T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.63028
published_at 2026-04-07T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63079
published_at 2026-04-08T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63095
published_at 2026-04-09T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63112
published_at 2026-04-16T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.63098
published_at 2026-04-12T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63076
published_at 2026-04-13T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.6312
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4074
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4074
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2fqk-vzr3-euex
12
url VCID-2gnj-byu1-abht
vulnerability_id VCID-2gnj-byu1-abht
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4902
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-02T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50563
published_at 2026-04-04T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50516
published_at 2026-04-07T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-08T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50568
published_at 2026-04-09T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.5061
published_at 2026-04-11T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50587
published_at 2026-04-12T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50572
published_at 2026-04-13T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50614
published_at 2026-04-16T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50619
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4902
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4902
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2gnj-byu1-abht
13
url VCID-2kje-xqy6-d3eh
vulnerability_id VCID-2kje-xqy6-d3eh
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4361
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.1693
published_at 2026-04-02T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16986
published_at 2026-04-04T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16768
published_at 2026-04-07T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16856
published_at 2026-04-08T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16913
published_at 2026-04-09T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16888
published_at 2026-04-11T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16844
published_at 2026-04-12T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16785
published_at 2026-04-13T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16721
published_at 2026-04-16T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16727
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4361
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4361
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2kje-xqy6-d3eh
14
url VCID-2rbc-nvrx-3yaw
vulnerability_id VCID-2rbc-nvrx-3yaw
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4072
reference_id
reference_type
scores
0
value 0.00424
scoring_system epss
scoring_elements 0.62138
published_at 2026-04-07T12:55:00Z
1
value 0.00424
scoring_system epss
scoring_elements 0.6217
published_at 2026-04-04T12:55:00Z
2
value 0.00424
scoring_system epss
scoring_elements 0.62188
published_at 2026-04-08T12:55:00Z
3
value 0.00424
scoring_system epss
scoring_elements 0.62205
published_at 2026-04-09T12:55:00Z
4
value 0.00424
scoring_system epss
scoring_elements 0.62223
published_at 2026-04-11T12:55:00Z
5
value 0.00424
scoring_system epss
scoring_elements 0.62213
published_at 2026-04-12T12:55:00Z
6
value 0.00424
scoring_system epss
scoring_elements 0.62193
published_at 2026-04-13T12:55:00Z
7
value 0.00424
scoring_system epss
scoring_elements 0.62237
published_at 2026-04-16T12:55:00Z
8
value 0.00424
scoring_system epss
scoring_elements 0.62244
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4072
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4072
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2rbc-nvrx-3yaw
15
url VCID-2zmc-qekg-4bfp
vulnerability_id VCID-2zmc-qekg-4bfp
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4358
reference_id
reference_type
scores
0
value 0.00962
scoring_system epss
scoring_elements 0.76501
published_at 2026-04-08T12:55:00Z
1
value 0.00962
scoring_system epss
scoring_elements 0.76458
published_at 2026-04-02T12:55:00Z
2
value 0.00962
scoring_system epss
scoring_elements 0.76518
published_at 2026-04-12T12:55:00Z
3
value 0.00962
scoring_system epss
scoring_elements 0.76539
published_at 2026-04-11T12:55:00Z
4
value 0.00962
scoring_system epss
scoring_elements 0.76513
published_at 2026-04-09T12:55:00Z
5
value 0.00962
scoring_system epss
scoring_elements 0.76487
published_at 2026-04-04T12:55:00Z
6
value 0.00962
scoring_system epss
scoring_elements 0.76469
published_at 2026-04-07T12:55:00Z
7
value 0.00962
scoring_system epss
scoring_elements 0.76556
published_at 2026-04-18T12:55:00Z
8
value 0.00962
scoring_system epss
scoring_elements 0.76553
published_at 2026-04-16T12:55:00Z
9
value 0.00962
scoring_system epss
scoring_elements 0.76512
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4358
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
22
reference_url https://crbug.com/1466415
reference_id 1466415
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-07-03T14:06:08Z/
url https://crbug.com/1466415
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
reference_id 2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-07-03T14:06:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
24
reference_url https://www.debian.org/security/2023/dsa-5479
reference_id dsa-5479
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-07-03T14:06:08Z/
url https://www.debian.org/security/2023/dsa-5479
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
reference_id OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-07-03T14:06:08Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
26
reference_url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2025-07-03T14:06:08Z/
url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4358
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2zmc-qekg-4bfp
16
url VCID-3ftn-eerm-yuer
vulnerability_id VCID-3ftn-eerm-yuer
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4368
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15689
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15753
published_at 2026-04-04T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15557
published_at 2026-04-07T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15643
published_at 2026-04-08T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.157
published_at 2026-04-09T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15667
published_at 2026-04-11T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15632
published_at 2026-04-12T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15567
published_at 2026-04-13T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15493
published_at 2026-04-16T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15501
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4368
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4368
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ftn-eerm-yuer
17
url VCID-3szd-qa15-2fca
vulnerability_id VCID-3szd-qa15-2fca
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4903
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-02T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50563
published_at 2026-04-04T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50516
published_at 2026-04-07T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-08T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50568
published_at 2026-04-09T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.5061
published_at 2026-04-11T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50587
published_at 2026-04-12T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50572
published_at 2026-04-13T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50614
published_at 2026-04-16T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50619
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4903
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4903
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3szd-qa15-2fca
18
url VCID-42rx-jzv8-1ucs
vulnerability_id VCID-42rx-jzv8-1ucs
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5853
reference_id
reference_type
scores
0
value 0.00668
scoring_system epss
scoring_elements 0.71243
published_at 2026-04-02T12:55:00Z
1
value 0.00668
scoring_system epss
scoring_elements 0.71261
published_at 2026-04-04T12:55:00Z
2
value 0.00668
scoring_system epss
scoring_elements 0.71236
published_at 2026-04-07T12:55:00Z
3
value 0.00668
scoring_system epss
scoring_elements 0.71278
published_at 2026-04-08T12:55:00Z
4
value 0.00668
scoring_system epss
scoring_elements 0.71291
published_at 2026-04-09T12:55:00Z
5
value 0.00668
scoring_system epss
scoring_elements 0.71314
published_at 2026-04-11T12:55:00Z
6
value 0.00668
scoring_system epss
scoring_elements 0.71298
published_at 2026-04-12T12:55:00Z
7
value 0.00668
scoring_system epss
scoring_elements 0.71282
published_at 2026-04-13T12:55:00Z
8
value 0.00668
scoring_system epss
scoring_elements 0.71329
published_at 2026-04-16T12:55:00Z
9
value 0.00668
scoring_system epss
scoring_elements 0.71335
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5853
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
19
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5853
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-42rx-jzv8-1ucs
19
url VCID-44c3-n3uz-p7fn
vulnerability_id VCID-44c3-n3uz-p7fn
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5855
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66934
published_at 2026-04-07T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.66933
published_at 2026-04-02T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.67017
published_at 2026-04-18T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.67003
published_at 2026-04-16T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.6697
published_at 2026-04-13T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.67001
published_at 2026-04-12T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.67015
published_at 2026-04-11T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.66995
published_at 2026-04-09T12:55:00Z
8
value 0.00524
scoring_system epss
scoring_elements 0.66982
published_at 2026-04-08T12:55:00Z
9
value 0.00524
scoring_system epss
scoring_elements 0.66959
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5855
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://crbug.com/1492396
reference_id 1492396
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:57Z/
url https://crbug.com/1492396
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
reference_id 2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
20
reference_url https://www.debian.org/security/2023/dsa-5546
reference_id dsa-5546
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:57Z/
url https://www.debian.org/security/2023/dsa-5546
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
reference_id EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
22
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:57Z/
url https://security.gentoo.org/glsa/202311-11
23
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:57Z/
url https://security.gentoo.org/glsa/202312-07
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
reference_id PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
25
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
reference_id stable-channel-update-for-desktop_31.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:57Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5855
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-44c3-n3uz-p7fn
20
url VCID-46uc-c6yr-mugc
vulnerability_id VCID-46uc-c6yr-mugc
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5480
reference_id
reference_type
scores
0
value 0.00226
scoring_system epss
scoring_elements 0.45404
published_at 2026-04-02T12:55:00Z
1
value 0.00226
scoring_system epss
scoring_elements 0.45424
published_at 2026-04-09T12:55:00Z
2
value 0.00226
scoring_system epss
scoring_elements 0.45368
published_at 2026-04-07T12:55:00Z
3
value 0.00226
scoring_system epss
scoring_elements 0.45423
published_at 2026-04-08T12:55:00Z
4
value 0.00226
scoring_system epss
scoring_elements 0.45445
published_at 2026-04-11T12:55:00Z
5
value 0.00226
scoring_system epss
scoring_elements 0.45415
published_at 2026-04-12T12:55:00Z
6
value 0.00226
scoring_system epss
scoring_elements 0.45416
published_at 2026-04-13T12:55:00Z
7
value 0.00226
scoring_system epss
scoring_elements 0.45467
published_at 2026-04-16T12:55:00Z
8
value 0.00226
scoring_system epss
scoring_elements 0.45463
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5480
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
19
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5480
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-46uc-c6yr-mugc
21
url VCID-49pe-zvt3-4udh
vulnerability_id VCID-49pe-zvt3-4udh
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4428
reference_id
reference_type
scores
0
value 0.10929
scoring_system epss
scoring_elements 0.93376
published_at 2026-04-02T12:55:00Z
1
value 0.10929
scoring_system epss
scoring_elements 0.93384
published_at 2026-04-07T12:55:00Z
2
value 0.10929
scoring_system epss
scoring_elements 0.93392
published_at 2026-04-08T12:55:00Z
3
value 0.10929
scoring_system epss
scoring_elements 0.93396
published_at 2026-04-09T12:55:00Z
4
value 0.10929
scoring_system epss
scoring_elements 0.93401
published_at 2026-04-13T12:55:00Z
5
value 0.10929
scoring_system epss
scoring_elements 0.9342
published_at 2026-04-16T12:55:00Z
6
value 0.10929
scoring_system epss
scoring_elements 0.93425
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4428
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4428
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4431
6
reference_url https://crbug.com/1470477
reference_id 1470477
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T14:01:32Z/
url https://crbug.com/1470477
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
reference_id 27NR3KG553CG6LGPMP6SHWEVHTYPL6RC
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T14:01:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
8
reference_url https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html
reference_id chrome-desktop-stable-update.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T14:01:32Z/
url https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html
9
reference_url https://www.debian.org/security/2023/dsa-5483
reference_id dsa-5483
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T14:01:32Z/
url https://www.debian.org/security/2023/dsa-5483
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-01T14:01:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4428
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-49pe-zvt3-4udh
22
url VCID-4ge9-qsks-n3fa
vulnerability_id VCID-4ge9-qsks-n3fa
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6512
reference_id
reference_type
scores
0
value 0.005
scoring_system epss
scoring_elements 0.65916
published_at 2026-04-02T12:55:00Z
1
value 0.005
scoring_system epss
scoring_elements 0.65946
published_at 2026-04-04T12:55:00Z
2
value 0.005
scoring_system epss
scoring_elements 0.65912
published_at 2026-04-07T12:55:00Z
3
value 0.005
scoring_system epss
scoring_elements 0.65964
published_at 2026-04-08T12:55:00Z
4
value 0.005
scoring_system epss
scoring_elements 0.65976
published_at 2026-04-09T12:55:00Z
5
value 0.005
scoring_system epss
scoring_elements 0.65994
published_at 2026-04-11T12:55:00Z
6
value 0.005
scoring_system epss
scoring_elements 0.65981
published_at 2026-04-12T12:55:00Z
7
value 0.005
scoring_system epss
scoring_elements 0.65952
published_at 2026-04-13T12:55:00Z
8
value 0.005
scoring_system epss
scoring_elements 0.65987
published_at 2026-04-16T12:55:00Z
9
value 0.005
scoring_system epss
scoring_elements 0.66
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6512
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
8
reference_url https://crbug.com/1457702
reference_id 1457702
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:50:41Z/
url https://crbug.com/1457702
9
reference_url https://www.debian.org/security/2023/dsa-5573
reference_id dsa-5573
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:50:41Z/
url https://www.debian.org/security/2023/dsa-5573
10
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/
reference_id MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:50:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/
reference_id RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:50:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/
13
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-28T15:50:41Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6512
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4ge9-qsks-n3fa
23
url VCID-4qnd-qsw2-akaf
vulnerability_id VCID-4qnd-qsw2-akaf
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4366
reference_id
reference_type
scores
0
value 0.00133
scoring_system epss
scoring_elements 0.33026
published_at 2026-04-02T12:55:00Z
1
value 0.00133
scoring_system epss
scoring_elements 0.3306
published_at 2026-04-04T12:55:00Z
2
value 0.00133
scoring_system epss
scoring_elements 0.32889
published_at 2026-04-07T12:55:00Z
3
value 0.00133
scoring_system epss
scoring_elements 0.32936
published_at 2026-04-08T12:55:00Z
4
value 0.00133
scoring_system epss
scoring_elements 0.32966
published_at 2026-04-09T12:55:00Z
5
value 0.00133
scoring_system epss
scoring_elements 0.32968
published_at 2026-04-11T12:55:00Z
6
value 0.00133
scoring_system epss
scoring_elements 0.3293
published_at 2026-04-12T12:55:00Z
7
value 0.00133
scoring_system epss
scoring_elements 0.32904
published_at 2026-04-13T12:55:00Z
8
value 0.00133
scoring_system epss
scoring_elements 0.32945
published_at 2026-04-16T12:55:00Z
9
value 0.00133
scoring_system epss
scoring_elements 0.32923
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4366
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4366
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qnd-qsw2-akaf
24
url VCID-4qnz-zr5y-aucc
vulnerability_id VCID-4qnz-zr5y-aucc
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5473
reference_id
reference_type
scores
0
value 0.00327
scoring_system epss
scoring_elements 0.55679
published_at 2026-04-18T12:55:00Z
1
value 0.00327
scoring_system epss
scoring_elements 0.55665
published_at 2026-04-09T12:55:00Z
2
value 0.00327
scoring_system epss
scoring_elements 0.55674
published_at 2026-04-11T12:55:00Z
3
value 0.00327
scoring_system epss
scoring_elements 0.55654
published_at 2026-04-12T12:55:00Z
4
value 0.00327
scoring_system epss
scoring_elements 0.55637
published_at 2026-04-13T12:55:00Z
5
value 0.00327
scoring_system epss
scoring_elements 0.55675
published_at 2026-04-16T12:55:00Z
6
value 0.00327
scoring_system epss
scoring_elements 0.55609
published_at 2026-04-02T12:55:00Z
7
value 0.00327
scoring_system epss
scoring_elements 0.55634
published_at 2026-04-04T12:55:00Z
8
value 0.00327
scoring_system epss
scoring_elements 0.55611
published_at 2026-04-07T12:55:00Z
9
value 0.00327
scoring_system epss
scoring_elements 0.55662
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5473
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://crbug.com/1484000
reference_id 1484000
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:54:48Z/
url https://crbug.com/1484000
16
reference_url https://www.debian.org/security/2023/dsa-5526
reference_id dsa-5526
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:54:48Z/
url https://www.debian.org/security/2023/dsa-5526
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:54:48Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:54:48Z/
url https://security.gentoo.org/glsa/202312-07
19
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
reference_id stable-channel-update-for-desktop_10.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:54:48Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5473
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4qnz-zr5y-aucc
25
url VCID-595b-76be-pugc
vulnerability_id VCID-595b-76be-pugc
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2936
reference_id
reference_type
scores
0
value 0.09401
scoring_system epss
scoring_elements 0.92767
published_at 2026-04-02T12:55:00Z
1
value 0.09401
scoring_system epss
scoring_elements 0.92772
published_at 2026-04-04T12:55:00Z
2
value 0.09401
scoring_system epss
scoring_elements 0.92769
published_at 2026-04-07T12:55:00Z
3
value 0.09401
scoring_system epss
scoring_elements 0.92779
published_at 2026-04-08T12:55:00Z
4
value 0.09401
scoring_system epss
scoring_elements 0.92783
published_at 2026-04-09T12:55:00Z
5
value 0.09401
scoring_system epss
scoring_elements 0.92789
published_at 2026-04-11T12:55:00Z
6
value 0.09401
scoring_system epss
scoring_elements 0.92787
published_at 2026-04-12T12:55:00Z
7
value 0.09401
scoring_system epss
scoring_elements 0.92788
published_at 2026-04-13T12:55:00Z
8
value 0.09401
scoring_system epss
scoring_elements 0.92798
published_at 2026-04-16T12:55:00Z
9
value 0.09401
scoring_system epss
scoring_elements 0.92799
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2936
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2936
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-595b-76be-pugc
26
url VCID-5aeu-p3r4-myfe
vulnerability_id VCID-5aeu-p3r4-myfe
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4357
reference_id
reference_type
scores
0
value 0.57479
scoring_system epss
scoring_elements 0.98151
published_at 2026-04-07T12:55:00Z
1
value 0.57479
scoring_system epss
scoring_elements 0.98146
published_at 2026-04-02T12:55:00Z
2
value 0.57479
scoring_system epss
scoring_elements 0.9816
published_at 2026-04-11T12:55:00Z
3
value 0.57479
scoring_system epss
scoring_elements 0.98156
published_at 2026-04-09T12:55:00Z
4
value 0.57479
scoring_system epss
scoring_elements 0.98155
published_at 2026-04-08T12:55:00Z
5
value 0.57479
scoring_system epss
scoring_elements 0.98149
published_at 2026-04-04T12:55:00Z
6
value 0.57479
scoring_system epss
scoring_elements 0.98166
published_at 2026-04-18T12:55:00Z
7
value 0.57479
scoring_system epss
scoring_elements 0.98165
published_at 2026-04-16T12:55:00Z
8
value 0.57479
scoring_system epss
scoring_elements 0.98159
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4357
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
22
reference_url https://crbug.com/1458911
reference_id 1458911
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:31:50Z/
url https://crbug.com/1458911
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
reference_id 2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:31:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
24
reference_url https://www.debian.org/security/2023/dsa-5479
reference_id dsa-5479
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:31:50Z/
url https://www.debian.org/security/2023/dsa-5479
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
reference_id OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:31:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
26
reference_url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T19:31:50Z/
url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4357
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5aeu-p3r4-myfe
27
url VCID-5e8d-97mj-byej
vulnerability_id VCID-5e8d-97mj-byej
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4364
reference_id
reference_type
scores
0
value 0.00345
scoring_system epss
scoring_elements 0.5707
published_at 2026-04-02T12:55:00Z
1
value 0.00345
scoring_system epss
scoring_elements 0.57092
published_at 2026-04-04T12:55:00Z
2
value 0.00345
scoring_system epss
scoring_elements 0.57069
published_at 2026-04-07T12:55:00Z
3
value 0.00345
scoring_system epss
scoring_elements 0.5712
published_at 2026-04-08T12:55:00Z
4
value 0.00345
scoring_system epss
scoring_elements 0.57121
published_at 2026-04-09T12:55:00Z
5
value 0.00345
scoring_system epss
scoring_elements 0.57133
published_at 2026-04-11T12:55:00Z
6
value 0.00345
scoring_system epss
scoring_elements 0.57112
published_at 2026-04-18T12:55:00Z
7
value 0.00345
scoring_system epss
scoring_elements 0.57089
published_at 2026-04-13T12:55:00Z
8
value 0.00345
scoring_system epss
scoring_elements 0.57117
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4364
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4364
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5e8d-97mj-byej
28
url VCID-5hjv-kk44-jqfb
vulnerability_id VCID-5hjv-kk44-jqfb
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4354
reference_id
reference_type
scores
0
value 0.01969
scoring_system epss
scoring_elements 0.83568
published_at 2026-04-18T12:55:00Z
1
value 0.01969
scoring_system epss
scoring_elements 0.8348
published_at 2026-04-02T12:55:00Z
2
value 0.01969
scoring_system epss
scoring_elements 0.83495
published_at 2026-04-04T12:55:00Z
3
value 0.01969
scoring_system epss
scoring_elements 0.83494
published_at 2026-04-07T12:55:00Z
4
value 0.01969
scoring_system epss
scoring_elements 0.83518
published_at 2026-04-08T12:55:00Z
5
value 0.01969
scoring_system epss
scoring_elements 0.83528
published_at 2026-04-09T12:55:00Z
6
value 0.01969
scoring_system epss
scoring_elements 0.83542
published_at 2026-04-11T12:55:00Z
7
value 0.01969
scoring_system epss
scoring_elements 0.83536
published_at 2026-04-12T12:55:00Z
8
value 0.01969
scoring_system epss
scoring_elements 0.83533
published_at 2026-04-13T12:55:00Z
9
value 0.01969
scoring_system epss
scoring_elements 0.83567
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4354
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
22
reference_url https://crbug.com/1464215
reference_id 1464215
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://crbug.com/1464215
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
reference_id 2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
24
reference_url http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html
reference_id Chrome-SKIA-Integer-Overflow.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url http://packetstormsecurity.com/files/174949/Chrome-SKIA-Integer-Overflow.html
25
reference_url https://www.debian.org/security/2023/dsa-5479
reference_id dsa-5479
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://www.debian.org/security/2023/dsa-5479
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
reference_id OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
27
reference_url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:33Z/
url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4354
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5hjv-kk44-jqfb
29
url VCID-5t6v-c37r-pbfp
vulnerability_id VCID-5t6v-c37r-pbfp
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3727
reference_id
reference_type
scores
0
value 0.00513
scoring_system epss
scoring_elements 0.66479
published_at 2026-04-02T12:55:00Z
1
value 0.00513
scoring_system epss
scoring_elements 0.66505
published_at 2026-04-04T12:55:00Z
2
value 0.00513
scoring_system epss
scoring_elements 0.66476
published_at 2026-04-07T12:55:00Z
3
value 0.00513
scoring_system epss
scoring_elements 0.66525
published_at 2026-04-08T12:55:00Z
4
value 0.00513
scoring_system epss
scoring_elements 0.66539
published_at 2026-04-09T12:55:00Z
5
value 0.00513
scoring_system epss
scoring_elements 0.66558
published_at 2026-04-11T12:55:00Z
6
value 0.00513
scoring_system epss
scoring_elements 0.66546
published_at 2026-04-12T12:55:00Z
7
value 0.00513
scoring_system epss
scoring_elements 0.66514
published_at 2026-04-13T12:55:00Z
8
value 0.00513
scoring_system epss
scoring_elements 0.66549
published_at 2026-04-16T12:55:00Z
9
value 0.00513
scoring_system epss
scoring_elements 0.66566
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3727
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3727
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5t6v-c37r-pbfp
30
url VCID-6bdm-sdkv-6fh9
vulnerability_id VCID-6bdm-sdkv-6fh9
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6112
reference_id
reference_type
scores
0
value 0.22788
scoring_system epss
scoring_elements 0.95849
published_at 2026-04-02T12:55:00Z
1
value 0.22788
scoring_system epss
scoring_elements 0.95857
published_at 2026-04-04T12:55:00Z
2
value 0.22788
scoring_system epss
scoring_elements 0.9586
published_at 2026-04-07T12:55:00Z
3
value 0.22788
scoring_system epss
scoring_elements 0.95869
published_at 2026-04-08T12:55:00Z
4
value 0.22788
scoring_system epss
scoring_elements 0.95872
published_at 2026-04-09T12:55:00Z
5
value 0.22788
scoring_system epss
scoring_elements 0.95876
published_at 2026-04-11T12:55:00Z
6
value 0.22788
scoring_system epss
scoring_elements 0.95875
published_at 2026-04-12T12:55:00Z
7
value 0.22788
scoring_system epss
scoring_elements 0.95877
published_at 2026-04-13T12:55:00Z
8
value 0.22788
scoring_system epss
scoring_elements 0.95889
published_at 2026-04-16T12:55:00Z
9
value 0.22788
scoring_system epss
scoring_elements 0.95894
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6112
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5997
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6112
3
reference_url https://crbug.com/1499298
reference_id 1499298
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://crbug.com/1499298
4
reference_url http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html
reference_id Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url http://packetstormsecurity.com/files/176721/Chrome-content-NavigationURLLoaderImpl-FallbackToNonInterceptedRequest-Heap-Use-After-Free.html
5
reference_url https://www.debian.org/security/2023/dsa-5556
reference_id dsa-5556
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://www.debian.org/security/2023/dsa-5556
6
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://security.gentoo.org/glsa/202311-11
7
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://security.gentoo.org/glsa/202312-07
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/
reference_id JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/
reference_id MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/
11
reference_url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/
reference_id XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6112
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bdm-sdkv-6fh9
31
url VCID-6va4-mz1a-g7bc
vulnerability_id VCID-6va4-mz1a-g7bc
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5346
reference_id
reference_type
scores
0
value 0.01115
scoring_system epss
scoring_elements 0.78184
published_at 2026-04-13T12:55:00Z
1
value 0.01115
scoring_system epss
scoring_elements 0.78134
published_at 2026-04-02T12:55:00Z
2
value 0.01115
scoring_system epss
scoring_elements 0.78214
published_at 2026-04-18T12:55:00Z
3
value 0.01115
scoring_system epss
scoring_elements 0.78216
published_at 2026-04-16T12:55:00Z
4
value 0.01115
scoring_system epss
scoring_elements 0.78164
published_at 2026-04-04T12:55:00Z
5
value 0.01115
scoring_system epss
scoring_elements 0.78147
published_at 2026-04-07T12:55:00Z
6
value 0.01115
scoring_system epss
scoring_elements 0.78173
published_at 2026-04-08T12:55:00Z
7
value 0.01115
scoring_system epss
scoring_elements 0.78179
published_at 2026-04-09T12:55:00Z
8
value 0.01115
scoring_system epss
scoring_elements 0.78204
published_at 2026-04-11T12:55:00Z
9
value 0.01115
scoring_system epss
scoring_elements 0.78187
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5346
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5346
2
reference_url https://crbug.com/1485829
reference_id 1485829
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:28Z/
url https://crbug.com/1485829
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMFDRMWMT6ZBLGLLWSWHHRAUBOSUXQDR/
reference_id BMFDRMWMT6ZBLGLLWSWHHRAUBOSUXQDR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BMFDRMWMT6ZBLGLLWSWHHRAUBOSUXQDR/
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/
reference_id M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4GHJ3FK5NPHDRUR4OJOI4UU6FKSOOGG/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA6HMWNOYQ56R35MHW77GVW7373Z4RSN/
reference_id RA6HMWNOYQ56R35MHW77GVW7373Z4RSN
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA6HMWNOYQ56R35MHW77GVW7373Z4RSN/
6
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:28Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5346
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6va4-mz1a-g7bc
32
url VCID-73d7-ya4e-d3hp
vulnerability_id VCID-73d7-ya4e-d3hp
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4362
reference_id
reference_type
scores
0
value 0.25555
scoring_system epss
scoring_elements 0.9624
published_at 2026-04-18T12:55:00Z
1
value 0.25555
scoring_system epss
scoring_elements 0.96218
published_at 2026-04-08T12:55:00Z
2
value 0.25555
scoring_system epss
scoring_elements 0.96221
published_at 2026-04-09T12:55:00Z
3
value 0.25555
scoring_system epss
scoring_elements 0.96225
published_at 2026-04-12T12:55:00Z
4
value 0.25555
scoring_system epss
scoring_elements 0.96226
published_at 2026-04-13T12:55:00Z
5
value 0.25555
scoring_system epss
scoring_elements 0.96236
published_at 2026-04-16T12:55:00Z
6
value 0.25555
scoring_system epss
scoring_elements 0.96196
published_at 2026-04-02T12:55:00Z
7
value 0.25555
scoring_system epss
scoring_elements 0.96204
published_at 2026-04-04T12:55:00Z
8
value 0.25555
scoring_system epss
scoring_elements 0.96208
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4362
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
22
reference_url https://crbug.com/1316379
reference_id 1316379
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:19:25Z/
url https://crbug.com/1316379
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
reference_id 2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:19:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
24
reference_url https://www.debian.org/security/2023/dsa-5479
reference_id dsa-5479
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:19:25Z/
url https://www.debian.org/security/2023/dsa-5479
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
reference_id OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:19:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
26
reference_url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:19:25Z/
url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4362
risk_score 0.1
exploitability 0.5
weighted_severity 0.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-73d7-ya4e-d3hp
33
url VCID-74gs-7vd3-13cg
vulnerability_id VCID-74gs-7vd3-13cg
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2934
reference_id
reference_type
scores
0
value 0.00813
scoring_system epss
scoring_elements 0.7431
published_at 2026-04-18T12:55:00Z
1
value 0.00813
scoring_system epss
scoring_elements 0.74221
published_at 2026-04-07T12:55:00Z
2
value 0.00813
scoring_system epss
scoring_elements 0.74248
published_at 2026-04-04T12:55:00Z
3
value 0.00813
scoring_system epss
scoring_elements 0.74253
published_at 2026-04-08T12:55:00Z
4
value 0.00813
scoring_system epss
scoring_elements 0.74268
published_at 2026-04-09T12:55:00Z
5
value 0.00813
scoring_system epss
scoring_elements 0.7429
published_at 2026-04-11T12:55:00Z
6
value 0.00813
scoring_system epss
scoring_elements 0.7427
published_at 2026-04-12T12:55:00Z
7
value 0.00813
scoring_system epss
scoring_elements 0.74263
published_at 2026-04-13T12:55:00Z
8
value 0.00813
scoring_system epss
scoring_elements 0.743
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2934
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1429720
reference_id 1429720
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:05Z/
url https://crbug.com/1429720
16
reference_url http://packetstormsecurity.com/files/173259/Chrome-Mojo-Message-Validation-Bypass.html
reference_id Chrome-Mojo-Message-Validation-Bypass.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:05Z/
url http://packetstormsecurity.com/files/173259/Chrome-Mojo-Message-Validation-Bypass.html
17
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:05Z/
url https://www.debian.org/security/2023/dsa-5418
18
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:05Z/
url https://security.gentoo.org/glsa/202311-11
19
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:05Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2934
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-74gs-7vd3-13cg
34
url VCID-7cut-5z2g-zbew
vulnerability_id VCID-7cut-5z2g-zbew
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5487
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09936
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09984
published_at 2026-04-04T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09882
published_at 2026-04-07T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09958
published_at 2026-04-08T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10007
published_at 2026-04-09T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10023
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.09982
published_at 2026-04-12T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09961
published_at 2026-04-13T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09837
published_at 2026-04-16T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.09806
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5487
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
16
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5487
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7cut-5z2g-zbew
35
url VCID-7sh5-vkkq-rkcg
vulnerability_id VCID-7sh5-vkkq-rkcg
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2930
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.2992
published_at 2026-04-11T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29954
published_at 2026-04-02T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29824
published_at 2026-04-13T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.30003
published_at 2026-04-04T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29816
published_at 2026-04-07T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29878
published_at 2026-04-08T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29914
published_at 2026-04-09T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29874
published_at 2026-04-12T12:55:00Z
8
value 0.00113
scoring_system epss
scoring_elements 0.29823
published_at 2026-04-18T12:55:00Z
9
value 0.00113
scoring_system epss
scoring_elements 0.29843
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2930
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1443401
reference_id 1443401
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:12Z/
url https://crbug.com/1443401
16
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:12Z/
url https://www.debian.org/security/2023/dsa-5418
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:12Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:12Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2930
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7sh5-vkkq-rkcg
36
url VCID-7syn-h4hu-cqe9
vulnerability_id VCID-7syn-h4hu-cqe9
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2312
reference_id
reference_type
scores
0
value 0.00411
scoring_system epss
scoring_elements 0.61464
published_at 2026-04-18T12:55:00Z
1
value 0.00411
scoring_system epss
scoring_elements 0.61433
published_at 2026-04-09T12:55:00Z
2
value 0.00411
scoring_system epss
scoring_elements 0.61454
published_at 2026-04-11T12:55:00Z
3
value 0.00411
scoring_system epss
scoring_elements 0.6144
published_at 2026-04-12T12:55:00Z
4
value 0.00411
scoring_system epss
scoring_elements 0.61421
published_at 2026-04-13T12:55:00Z
5
value 0.00411
scoring_system epss
scoring_elements 0.61461
published_at 2026-04-16T12:55:00Z
6
value 0.00411
scoring_system epss
scoring_elements 0.61373
published_at 2026-04-02T12:55:00Z
7
value 0.00411
scoring_system epss
scoring_elements 0.61402
published_at 2026-04-04T12:55:00Z
8
value 0.00411
scoring_system epss
scoring_elements 0.61371
published_at 2026-04-07T12:55:00Z
9
value 0.00411
scoring_system epss
scoring_elements 0.61417
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2312
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
22
reference_url https://crbug.com/1448548
reference_id 1448548
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:05:29Z/
url https://crbug.com/1448548
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
reference_id 2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:05:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
24
reference_url https://www.debian.org/security/2023/dsa-5479
reference_id dsa-5479
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:05:29Z/
url https://www.debian.org/security/2023/dsa-5479
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
reference_id OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:05:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
26
reference_url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:05:29Z/
url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2312
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7syn-h4hu-cqe9
37
url VCID-7y1j-f65w-s7cc
vulnerability_id VCID-7y1j-f65w-s7cc
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5486
reference_id
reference_type
scores
0
value 0.00267
scoring_system epss
scoring_elements 0.5024
published_at 2026-04-18T12:55:00Z
1
value 0.00267
scoring_system epss
scoring_elements 0.5021
published_at 2026-04-08T12:55:00Z
2
value 0.00267
scoring_system epss
scoring_elements 0.50204
published_at 2026-04-09T12:55:00Z
3
value 0.00267
scoring_system epss
scoring_elements 0.50232
published_at 2026-04-11T12:55:00Z
4
value 0.00267
scoring_system epss
scoring_elements 0.50194
published_at 2026-04-13T12:55:00Z
5
value 0.00267
scoring_system epss
scoring_elements 0.50239
published_at 2026-04-16T12:55:00Z
6
value 0.00267
scoring_system epss
scoring_elements 0.50178
published_at 2026-04-02T12:55:00Z
7
value 0.00267
scoring_system epss
scoring_elements 0.50206
published_at 2026-04-12T12:55:00Z
8
value 0.00267
scoring_system epss
scoring_elements 0.50156
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5486
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://crbug.com/1357442
reference_id 1357442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T14:32:24Z/
url https://crbug.com/1357442
16
reference_url https://www.debian.org/security/2023/dsa-5526
reference_id dsa-5526
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T14:32:24Z/
url https://www.debian.org/security/2023/dsa-5526
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T14:32:24Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T14:32:24Z/
url https://security.gentoo.org/glsa/202312-07
19
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
reference_id stable-channel-update-for-desktop_10.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T14:32:24Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5486
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7y1j-f65w-s7cc
38
url VCID-8ftx-t5ay-gbhy
vulnerability_id VCID-8ftx-t5ay-gbhy
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5854
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66934
published_at 2026-04-07T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.67001
published_at 2026-04-12T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.67015
published_at 2026-04-11T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.66995
published_at 2026-04-09T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.66982
published_at 2026-04-08T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.66959
published_at 2026-04-04T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.66933
published_at 2026-04-02T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.67017
published_at 2026-04-18T12:55:00Z
8
value 0.00524
scoring_system epss
scoring_elements 0.67003
published_at 2026-04-16T12:55:00Z
9
value 0.00524
scoring_system epss
scoring_elements 0.6697
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5854
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://crbug.com/1488267
reference_id 1488267
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:59Z/
url https://crbug.com/1488267
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
reference_id 2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
20
reference_url https://www.debian.org/security/2023/dsa-5546
reference_id dsa-5546
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:59Z/
url https://www.debian.org/security/2023/dsa-5546
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
reference_id EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
22
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:59Z/
url https://security.gentoo.org/glsa/202311-11
23
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:59Z/
url https://security.gentoo.org/glsa/202312-07
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
reference_id PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:59Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
25
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
reference_id stable-channel-update-for-desktop_31.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:59Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5854
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ftx-t5ay-gbhy
39
url VCID-8pxs-d9q4-7ucb
vulnerability_id VCID-8pxs-d9q4-7ucb
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3736
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.3289
published_at 2026-04-02T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32924
published_at 2026-04-04T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32746
published_at 2026-04-07T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32794
published_at 2026-04-08T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.3282
published_at 2026-04-09T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32822
published_at 2026-04-11T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32784
published_at 2026-04-12T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32758
published_at 2026-04-13T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.328
published_at 2026-04-16T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32775
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3736
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3736
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8pxs-d9q4-7ucb
40
url VCID-8uf2-grkf-gbhd
vulnerability_id VCID-8uf2-grkf-gbhd
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4076
reference_id
reference_type
scores
0
value 0.00781
scoring_system epss
scoring_elements 0.73661
published_at 2026-04-02T12:55:00Z
1
value 0.00781
scoring_system epss
scoring_elements 0.73685
published_at 2026-04-04T12:55:00Z
2
value 0.00781
scoring_system epss
scoring_elements 0.73658
published_at 2026-04-07T12:55:00Z
3
value 0.00781
scoring_system epss
scoring_elements 0.73693
published_at 2026-04-08T12:55:00Z
4
value 0.00781
scoring_system epss
scoring_elements 0.73706
published_at 2026-04-09T12:55:00Z
5
value 0.00781
scoring_system epss
scoring_elements 0.73727
published_at 2026-04-11T12:55:00Z
6
value 0.00781
scoring_system epss
scoring_elements 0.73709
published_at 2026-04-12T12:55:00Z
7
value 0.00781
scoring_system epss
scoring_elements 0.737
published_at 2026-04-13T12:55:00Z
8
value 0.00781
scoring_system epss
scoring_elements 0.73743
published_at 2026-04-16T12:55:00Z
9
value 0.00781
scoring_system epss
scoring_elements 0.73752
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4076
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4076
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8uf2-grkf-gbhd
41
url VCID-9czp-wct7-8qa7
vulnerability_id VCID-9czp-wct7-8qa7
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6703
reference_id
reference_type
scores
0
value 0.00337
scoring_system epss
scoring_elements 0.56569
published_at 2026-04-02T12:55:00Z
1
value 0.00337
scoring_system epss
scoring_elements 0.5659
published_at 2026-04-04T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.56568
published_at 2026-04-07T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.5662
published_at 2026-04-08T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.56624
published_at 2026-04-09T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56633
published_at 2026-04-11T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56609
published_at 2026-04-12T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56587
published_at 2026-04-13T12:55:00Z
8
value 0.00337
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-16T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56617
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6703
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6703
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9czp-wct7-8qa7
42
url VCID-9dea-aw3q-eyc6
vulnerability_id VCID-9dea-aw3q-eyc6
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4905
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50619
published_at 2026-04-18T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-08T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50568
published_at 2026-04-09T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.5061
published_at 2026-04-11T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50587
published_at 2026-04-12T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50572
published_at 2026-04-13T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50614
published_at 2026-04-16T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-02T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50563
published_at 2026-04-04T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50516
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4905
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
14
reference_url https://crbug.com/1441228
reference_id 1441228
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:32:53Z/
url https://crbug.com/1441228
15
reference_url https://www.debian.org/security/2023/dsa-5499
reference_id dsa-5499
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:32:53Z/
url https://www.debian.org/security/2023/dsa-5499
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:32:53Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
17
reference_url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:32:53Z/
url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4905
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dea-aw3q-eyc6
43
url VCID-9fvg-dhn2-rkda
vulnerability_id VCID-9fvg-dhn2-rkda
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4356
reference_id
reference_type
scores
0
value 0.00962
scoring_system epss
scoring_elements 0.76458
published_at 2026-04-02T12:55:00Z
1
value 0.00962
scoring_system epss
scoring_elements 0.76487
published_at 2026-04-04T12:55:00Z
2
value 0.00962
scoring_system epss
scoring_elements 0.76469
published_at 2026-04-07T12:55:00Z
3
value 0.00962
scoring_system epss
scoring_elements 0.76501
published_at 2026-04-08T12:55:00Z
4
value 0.00962
scoring_system epss
scoring_elements 0.76513
published_at 2026-04-09T12:55:00Z
5
value 0.00962
scoring_system epss
scoring_elements 0.76539
published_at 2026-04-11T12:55:00Z
6
value 0.00962
scoring_system epss
scoring_elements 0.76518
published_at 2026-04-12T12:55:00Z
7
value 0.00962
scoring_system epss
scoring_elements 0.76512
published_at 2026-04-13T12:55:00Z
8
value 0.00962
scoring_system epss
scoring_elements 0.76553
published_at 2026-04-16T12:55:00Z
9
value 0.00962
scoring_system epss
scoring_elements 0.76556
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4356
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4356
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9fvg-dhn2-rkda
44
url VCID-9mcc-r6sq-hffk
vulnerability_id VCID-9mcc-r6sq-hffk
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4761
reference_id
reference_type
scores
0
value 0.00368
scoring_system epss
scoring_elements 0.58737
published_at 2026-04-02T12:55:00Z
1
value 0.00368
scoring_system epss
scoring_elements 0.58758
published_at 2026-04-04T12:55:00Z
2
value 0.00368
scoring_system epss
scoring_elements 0.58725
published_at 2026-04-07T12:55:00Z
3
value 0.00368
scoring_system epss
scoring_elements 0.58778
published_at 2026-04-08T12:55:00Z
4
value 0.00368
scoring_system epss
scoring_elements 0.58785
published_at 2026-04-12T12:55:00Z
5
value 0.00368
scoring_system epss
scoring_elements 0.58803
published_at 2026-04-11T12:55:00Z
6
value 0.00368
scoring_system epss
scoring_elements 0.58765
published_at 2026-04-13T12:55:00Z
7
value 0.00368
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-16T12:55:00Z
8
value 0.00368
scoring_system epss
scoring_elements 0.58802
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4761
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4762
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4763
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4764
5
reference_url https://crbug.com/1476403
reference_id 1476403
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-25T14:23:04Z/
url https://crbug.com/1476403
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
reference_id 27NR3KG553CG6LGPMP6SHWEVHTYPL6RC
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-25T14:23:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
7
reference_url https://www.debian.org/security/2023/dsa-5491
reference_id dsa-5491
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-25T14:23:04Z/
url https://www.debian.org/security/2023/dsa-5491
8
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-25T14:23:04Z/
url https://security.gentoo.org/glsa/202311-11
9
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-25T14:23:04Z/
url https://security.gentoo.org/glsa/202312-07
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-25T14:23:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
11
reference_url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-25T14:23:04Z/
url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4761
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9mcc-r6sq-hffk
45
url VCID-9z2q-k6z5-rqad
vulnerability_id VCID-9z2q-k6z5-rqad
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4367
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20888
published_at 2026-04-18T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.20915
published_at 2026-04-08T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20977
published_at 2026-04-09T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20994
published_at 2026-04-11T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20951
published_at 2026-04-12T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20897
published_at 2026-04-13T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21068
published_at 2026-04-02T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.21121
published_at 2026-04-04T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20835
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4367
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
22
reference_url https://crbug.com/1467743
reference_id 1467743
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:36:39Z/
url https://crbug.com/1467743
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
reference_id 2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:36:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
24
reference_url https://www.debian.org/security/2023/dsa-5479
reference_id dsa-5479
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:36:39Z/
url https://www.debian.org/security/2023/dsa-5479
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
reference_id OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:36:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
26
reference_url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:36:39Z/
url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4367
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9z2q-k6z5-rqad
46
url VCID-awm7-uace-8ye2
vulnerability_id VCID-awm7-uace-8ye2
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3737
reference_id
reference_type
scores
0
value 0.00173
scoring_system epss
scoring_elements 0.38694
published_at 2026-04-02T12:55:00Z
1
value 0.00173
scoring_system epss
scoring_elements 0.38717
published_at 2026-04-04T12:55:00Z
2
value 0.00173
scoring_system epss
scoring_elements 0.38646
published_at 2026-04-07T12:55:00Z
3
value 0.00173
scoring_system epss
scoring_elements 0.38697
published_at 2026-04-08T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38707
published_at 2026-04-09T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38718
published_at 2026-04-11T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.3868
published_at 2026-04-12T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38654
published_at 2026-04-13T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.38701
published_at 2026-04-16T12:55:00Z
9
value 0.00173
scoring_system epss
scoring_elements 0.38679
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3737
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3737
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-awm7-uace-8ye2
47
url VCID-b4jj-5x59-sbg4
vulnerability_id VCID-b4jj-5x59-sbg4
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3215
reference_id
reference_type
scores
0
value 0.19982
scoring_system epss
scoring_elements 0.95451
published_at 2026-04-07T12:55:00Z
1
value 0.19982
scoring_system epss
scoring_elements 0.95442
published_at 2026-04-02T12:55:00Z
2
value 0.19982
scoring_system epss
scoring_elements 0.95458
published_at 2026-04-08T12:55:00Z
3
value 0.19982
scoring_system epss
scoring_elements 0.95448
published_at 2026-04-04T12:55:00Z
4
value 0.20975
scoring_system epss
scoring_elements 0.95647
published_at 2026-04-16T12:55:00Z
5
value 0.20975
scoring_system epss
scoring_elements 0.95638
published_at 2026-04-13T12:55:00Z
6
value 0.20975
scoring_system epss
scoring_elements 0.95636
published_at 2026-04-12T12:55:00Z
7
value 0.20975
scoring_system epss
scoring_elements 0.95631
published_at 2026-04-09T12:55:00Z
8
value 0.20975
scoring_system epss
scoring_elements 0.95651
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3215
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3215
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3216
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3217
5
reference_url https://crbug.com/1446274
reference_id 1446274
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:48Z/
url https://crbug.com/1446274
6
reference_url https://www.debian.org/security/2023/dsa-5428
reference_id dsa-5428
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:48Z/
url https://www.debian.org/security/2023/dsa-5428
7
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:48Z/
url https://security.gentoo.org/glsa/202311-11
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/
reference_id JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/
reference_id O362DC3ZCFRXVHOXMPIL73YOWABQEUYD
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:48Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/
10
reference_url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
reference_id stable-channel-update-for-desktop_13.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:48Z/
url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3215
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b4jj-5x59-sbg4
48
url VCID-b74f-nv6y-f7b1
vulnerability_id VCID-b74f-nv6y-f7b1
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4909
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-02T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50563
published_at 2026-04-04T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50516
published_at 2026-04-07T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-08T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50568
published_at 2026-04-09T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.5061
published_at 2026-04-11T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50587
published_at 2026-04-12T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50572
published_at 2026-04-13T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50614
published_at 2026-04-16T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50619
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4909
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4909
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b74f-nv6y-f7b1
49
url VCID-c75z-eaav-9uce
vulnerability_id VCID-c75z-eaav-9uce
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5857
reference_id
reference_type
scores
0
value 0.01245
scoring_system epss
scoring_elements 0.79243
published_at 2026-04-02T12:55:00Z
1
value 0.01245
scoring_system epss
scoring_elements 0.79266
published_at 2026-04-04T12:55:00Z
2
value 0.01245
scoring_system epss
scoring_elements 0.79251
published_at 2026-04-07T12:55:00Z
3
value 0.01245
scoring_system epss
scoring_elements 0.79276
published_at 2026-04-08T12:55:00Z
4
value 0.01245
scoring_system epss
scoring_elements 0.79284
published_at 2026-04-09T12:55:00Z
5
value 0.01245
scoring_system epss
scoring_elements 0.79309
published_at 2026-04-16T12:55:00Z
6
value 0.01245
scoring_system epss
scoring_elements 0.79293
published_at 2026-04-12T12:55:00Z
7
value 0.01245
scoring_system epss
scoring_elements 0.79281
published_at 2026-04-13T12:55:00Z
8
value 0.01245
scoring_system epss
scoring_elements 0.79305
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5857
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://crbug.com/1493435
reference_id 1493435
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-06T16:17:39Z/
url https://crbug.com/1493435
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
reference_id 2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-06T16:17:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
20
reference_url https://www.debian.org/security/2023/dsa-5546
reference_id dsa-5546
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-06T16:17:39Z/
url https://www.debian.org/security/2023/dsa-5546
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
reference_id EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-06T16:17:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
22
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-06T16:17:39Z/
url https://security.gentoo.org/glsa/202311-11
23
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-06T16:17:39Z/
url https://security.gentoo.org/glsa/202312-07
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
reference_id PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-06T16:17:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
25
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
reference_id stable-channel-update-for-desktop_31.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-06T16:17:39Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5857
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c75z-eaav-9uce
50
url VCID-cd3t-41qy-fugp
vulnerability_id VCID-cd3t-41qy-fugp
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4073
reference_id
reference_type
scores
0
value 0.00702
scoring_system epss
scoring_elements 0.72003
published_at 2026-04-02T12:55:00Z
1
value 0.00702
scoring_system epss
scoring_elements 0.72023
published_at 2026-04-04T12:55:00Z
2
value 0.00702
scoring_system epss
scoring_elements 0.71999
published_at 2026-04-07T12:55:00Z
3
value 0.00702
scoring_system epss
scoring_elements 0.72037
published_at 2026-04-08T12:55:00Z
4
value 0.00702
scoring_system epss
scoring_elements 0.7205
published_at 2026-04-09T12:55:00Z
5
value 0.00702
scoring_system epss
scoring_elements 0.72073
published_at 2026-04-11T12:55:00Z
6
value 0.00702
scoring_system epss
scoring_elements 0.72056
published_at 2026-04-12T12:55:00Z
7
value 0.00702
scoring_system epss
scoring_elements 0.72041
published_at 2026-04-13T12:55:00Z
8
value 0.00702
scoring_system epss
scoring_elements 0.72082
published_at 2026-04-16T12:55:00Z
9
value 0.00702
scoring_system epss
scoring_elements 0.7209
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4073
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4073
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cd3t-41qy-fugp
51
url VCID-cpaa-27am-hydc
vulnerability_id VCID-cpaa-27am-hydc
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4359
reference_id
reference_type
scores
0
value 0.00237
scoring_system epss
scoring_elements 0.46755
published_at 2026-04-02T12:55:00Z
1
value 0.00237
scoring_system epss
scoring_elements 0.46775
published_at 2026-04-04T12:55:00Z
2
value 0.00237
scoring_system epss
scoring_elements 0.46723
published_at 2026-04-07T12:55:00Z
3
value 0.00237
scoring_system epss
scoring_elements 0.46778
published_at 2026-04-09T12:55:00Z
4
value 0.00237
scoring_system epss
scoring_elements 0.46801
published_at 2026-04-11T12:55:00Z
5
value 0.00237
scoring_system epss
scoring_elements 0.46773
published_at 2026-04-12T12:55:00Z
6
value 0.00237
scoring_system epss
scoring_elements 0.4678
published_at 2026-04-13T12:55:00Z
7
value 0.00237
scoring_system epss
scoring_elements 0.46835
published_at 2026-04-16T12:55:00Z
8
value 0.00237
scoring_system epss
scoring_elements 0.46832
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4359
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4359
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cpaa-27am-hydc
52
url VCID-dd9p-a4hh-5ycq
vulnerability_id VCID-dd9p-a4hh-5ycq
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3079
reference_id
reference_type
scores
0
value 0.02049
scoring_system epss
scoring_elements 0.83847
published_at 2026-04-08T12:55:00Z
1
value 0.02049
scoring_system epss
scoring_elements 0.83893
published_at 2026-04-18T12:55:00Z
2
value 0.02049
scoring_system epss
scoring_elements 0.83892
published_at 2026-04-16T12:55:00Z
3
value 0.02049
scoring_system epss
scoring_elements 0.83859
published_at 2026-04-13T12:55:00Z
4
value 0.02049
scoring_system epss
scoring_elements 0.83863
published_at 2026-04-12T12:55:00Z
5
value 0.02049
scoring_system epss
scoring_elements 0.8387
published_at 2026-04-11T12:55:00Z
6
value 0.02049
scoring_system epss
scoring_elements 0.83853
published_at 2026-04-09T12:55:00Z
7
value 0.02049
scoring_system epss
scoring_elements 0.83823
published_at 2026-04-07T12:55:00Z
8
value 0.02105
scoring_system epss
scoring_elements 0.84029
published_at 2026-04-02T12:55:00Z
9
value 0.02105
scoring_system epss
scoring_elements 0.84046
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3079
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3079
2
reference_url https://crbug.com/1450481
reference_id 1450481
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-08T17:30:24Z/
url https://crbug.com/1450481
3
reference_url http://packetstormsecurity.com/files/176211/Chrome-V8-Type-Confusion.html
reference_id Chrome-V8-Type-Confusion.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-08T17:30:24Z/
url http://packetstormsecurity.com/files/176211/Chrome-V8-Type-Confusion.html
4
reference_url http://packetstormsecurity.com/files/176212/Chrome-V8-Type-Confusion-New-Sandbox-Escape.html
reference_id Chrome-V8-Type-Confusion-New-Sandbox-Escape.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-08T17:30:24Z/
url http://packetstormsecurity.com/files/176212/Chrome-V8-Type-Confusion-New-Sandbox-Escape.html
5
reference_url https://www.debian.org/security/2023/dsa-5420
reference_id dsa-5420
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-08T17:30:24Z/
url https://www.debian.org/security/2023/dsa-5420
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYTXO5E3FI3I2ETDP3HF4SHYYTFMKMIC/
reference_id DYTXO5E3FI3I2ETDP3HF4SHYYTFMKMIC
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-08T17:30:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DYTXO5E3FI3I2ETDP3HF4SHYYTFMKMIC/
7
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-08T17:30:24Z/
url https://security.gentoo.org/glsa/202311-11
8
reference_url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-08T17:30:24Z/
url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop.html
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4OXTNIZY4JYHJT7CVLPAJQILI6BISVM/
reference_id U4OXTNIZY4JYHJT7CVLPAJQILI6BISVM
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-08T17:30:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U4OXTNIZY4JYHJT7CVLPAJQILI6BISVM/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3079
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dd9p-a4hh-5ycq
53
url VCID-dfq3-atj3-2ybd
vulnerability_id VCID-dfq3-atj3-2ybd
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5851
reference_id
reference_type
scores
0
value 0.00317
scoring_system epss
scoring_elements 0.54728
published_at 2026-04-02T12:55:00Z
1
value 0.00317
scoring_system epss
scoring_elements 0.54751
published_at 2026-04-04T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.63038
published_at 2026-04-07T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63089
published_at 2026-04-08T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63105
published_at 2026-04-09T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63122
published_at 2026-04-11T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.63108
published_at 2026-04-12T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63086
published_at 2026-04-13T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.63121
published_at 2026-04-16T12:55:00Z
9
value 0.00437
scoring_system epss
scoring_elements 0.63129
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5851
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
19
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5851
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dfq3-atj3-2ybd
54
url VCID-du71-79qv-tbaw
vulnerability_id VCID-du71-79qv-tbaw
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3740
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.32167
published_at 2026-04-02T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.32206
published_at 2026-04-04T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32029
published_at 2026-04-07T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.3208
published_at 2026-04-08T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.3211
published_at 2026-04-09T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32113
published_at 2026-04-11T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.32075
published_at 2026-04-12T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.32044
published_at 2026-04-13T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32078
published_at 2026-04-16T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32055
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3740
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3740
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-du71-79qv-tbaw
55
url VCID-dvb2-vgjj-z7he
vulnerability_id VCID-dvb2-vgjj-z7he
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4353
reference_id
reference_type
scores
0
value 0.01372
scoring_system epss
scoring_elements 0.80221
published_at 2026-04-08T12:55:00Z
1
value 0.01372
scoring_system epss
scoring_elements 0.80184
published_at 2026-04-02T12:55:00Z
2
value 0.01372
scoring_system epss
scoring_elements 0.80234
published_at 2026-04-12T12:55:00Z
3
value 0.01372
scoring_system epss
scoring_elements 0.80249
published_at 2026-04-11T12:55:00Z
4
value 0.01372
scoring_system epss
scoring_elements 0.80231
published_at 2026-04-09T12:55:00Z
5
value 0.01372
scoring_system epss
scoring_elements 0.80204
published_at 2026-04-04T12:55:00Z
6
value 0.01372
scoring_system epss
scoring_elements 0.80193
published_at 2026-04-07T12:55:00Z
7
value 0.01372
scoring_system epss
scoring_elements 0.8026
published_at 2026-04-18T12:55:00Z
8
value 0.01372
scoring_system epss
scoring_elements 0.80258
published_at 2026-04-16T12:55:00Z
9
value 0.01372
scoring_system epss
scoring_elements 0.80229
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4353
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
22
reference_url https://crbug.com/1458046
reference_id 1458046
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:48:46Z/
url https://crbug.com/1458046
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
reference_id 2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:48:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
24
reference_url https://www.debian.org/security/2023/dsa-5479
reference_id dsa-5479
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:48:46Z/
url https://www.debian.org/security/2023/dsa-5479
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
reference_id OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:48:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
26
reference_url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-01T18:48:46Z/
url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4353
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvb2-vgjj-z7he
56
url VCID-e1u4-ngv9-1qb3
vulnerability_id VCID-e1u4-ngv9-1qb3
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0222
reference_id
reference_type
scores
0
value 0.00443
scoring_system epss
scoring_elements 0.63375
published_at 2026-04-18T12:55:00Z
1
value 0.0056
scoring_system epss
scoring_elements 0.68214
published_at 2026-04-02T12:55:00Z
2
value 0.0056
scoring_system epss
scoring_elements 0.68233
published_at 2026-04-04T12:55:00Z
3
value 0.0056
scoring_system epss
scoring_elements 0.68209
published_at 2026-04-07T12:55:00Z
4
value 0.0056
scoring_system epss
scoring_elements 0.6826
published_at 2026-04-08T12:55:00Z
5
value 0.0056
scoring_system epss
scoring_elements 0.68275
published_at 2026-04-09T12:55:00Z
6
value 0.0056
scoring_system epss
scoring_elements 0.683
published_at 2026-04-11T12:55:00Z
7
value 0.0056
scoring_system epss
scoring_elements 0.68288
published_at 2026-04-12T12:55:00Z
8
value 0.0056
scoring_system epss
scoring_elements 0.68254
published_at 2026-04-13T12:55:00Z
9
value 0.0056
scoring_system epss
scoring_elements 0.68294
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0222
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
5
reference_url https://crbug.com/1501798
reference_id 1501798
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:52:28Z/
url https://crbug.com/1501798
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
reference_id AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:52:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
reference_id D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:52:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
9
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:52:28Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2024-0222
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1u4-ngv9-1qb3
57
url VCID-e6kv-k89d-fqb7
vulnerability_id VCID-e6kv-k89d-fqb7
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4431
reference_id
reference_type
scores
0
value 0.00152
scoring_system epss
scoring_elements 0.35988
published_at 2026-04-02T12:55:00Z
1
value 0.00152
scoring_system epss
scoring_elements 0.36018
published_at 2026-04-04T12:55:00Z
2
value 0.00152
scoring_system epss
scoring_elements 0.35849
published_at 2026-04-07T12:55:00Z
3
value 0.00152
scoring_system epss
scoring_elements 0.359
published_at 2026-04-08T12:55:00Z
4
value 0.00152
scoring_system epss
scoring_elements 0.35922
published_at 2026-04-09T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35928
published_at 2026-04-11T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35887
published_at 2026-04-12T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35864
published_at 2026-04-13T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35903
published_at 2026-04-16T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.3589
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4431
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4428
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4431
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4431
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e6kv-k89d-fqb7
58
url VCID-ej1p-hynu-bkcg
vulnerability_id VCID-ej1p-hynu-bkcg
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6347
reference_id
reference_type
scores
0
value 0.00368
scoring_system epss
scoring_elements 0.58749
published_at 2026-04-11T12:55:00Z
1
value 0.00368
scoring_system epss
scoring_elements 0.58683
published_at 2026-04-02T12:55:00Z
2
value 0.00368
scoring_system epss
scoring_elements 0.58747
published_at 2026-04-18T12:55:00Z
3
value 0.00368
scoring_system epss
scoring_elements 0.58743
published_at 2026-04-16T12:55:00Z
4
value 0.00368
scoring_system epss
scoring_elements 0.5871
published_at 2026-04-13T12:55:00Z
5
value 0.00368
scoring_system epss
scoring_elements 0.58705
published_at 2026-04-04T12:55:00Z
6
value 0.00368
scoring_system epss
scoring_elements 0.58672
published_at 2026-04-07T12:55:00Z
7
value 0.00368
scoring_system epss
scoring_elements 0.58723
published_at 2026-04-08T12:55:00Z
8
value 0.00368
scoring_system epss
scoring_elements 0.5873
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6347
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://crbug.com/1494461
reference_id 1494461
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://crbug.com/1494461
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/
reference_id 6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/
reference_id C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/
10
reference_url https://www.debian.org/security/2023/dsa-5569
reference_id dsa-5569
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://www.debian.org/security/2023/dsa-5569
11
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
12
reference_url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
reference_id stable-channel-update-for-desktop_28.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/
reference_id UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-06-05T13:42:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6347
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ej1p-hynu-bkcg
59
url VCID-epye-nwff-b3fs
vulnerability_id VCID-epye-nwff-b3fs
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4360
reference_id
reference_type
scores
0
value 0.00345
scoring_system epss
scoring_elements 0.5707
published_at 2026-04-02T12:55:00Z
1
value 0.00345
scoring_system epss
scoring_elements 0.57092
published_at 2026-04-04T12:55:00Z
2
value 0.00345
scoring_system epss
scoring_elements 0.57069
published_at 2026-04-07T12:55:00Z
3
value 0.00345
scoring_system epss
scoring_elements 0.5712
published_at 2026-04-08T12:55:00Z
4
value 0.00345
scoring_system epss
scoring_elements 0.57121
published_at 2026-04-09T12:55:00Z
5
value 0.00345
scoring_system epss
scoring_elements 0.57133
published_at 2026-04-11T12:55:00Z
6
value 0.00345
scoring_system epss
scoring_elements 0.57112
published_at 2026-04-18T12:55:00Z
7
value 0.00345
scoring_system epss
scoring_elements 0.57089
published_at 2026-04-13T12:55:00Z
8
value 0.00345
scoring_system epss
scoring_elements 0.57117
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4360
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4360
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epye-nwff-b3fs
60
url VCID-ersn-dta8-sbhn
vulnerability_id VCID-ersn-dta8-sbhn
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3728
reference_id
reference_type
scores
0
value 0.00513
scoring_system epss
scoring_elements 0.66479
published_at 2026-04-02T12:55:00Z
1
value 0.00513
scoring_system epss
scoring_elements 0.66505
published_at 2026-04-04T12:55:00Z
2
value 0.00513
scoring_system epss
scoring_elements 0.66476
published_at 2026-04-07T12:55:00Z
3
value 0.00513
scoring_system epss
scoring_elements 0.66525
published_at 2026-04-08T12:55:00Z
4
value 0.00513
scoring_system epss
scoring_elements 0.66539
published_at 2026-04-09T12:55:00Z
5
value 0.00513
scoring_system epss
scoring_elements 0.66558
published_at 2026-04-11T12:55:00Z
6
value 0.00513
scoring_system epss
scoring_elements 0.66546
published_at 2026-04-12T12:55:00Z
7
value 0.00513
scoring_system epss
scoring_elements 0.66514
published_at 2026-04-13T12:55:00Z
8
value 0.00513
scoring_system epss
scoring_elements 0.66549
published_at 2026-04-16T12:55:00Z
9
value 0.00513
scoring_system epss
scoring_elements 0.66566
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3728
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3728
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ersn-dta8-sbhn
61
url VCID-ervk-5a1a-s3cf
vulnerability_id VCID-ervk-5a1a-s3cf
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4349
reference_id
reference_type
scores
0
value 0.00962
scoring_system epss
scoring_elements 0.76458
published_at 2026-04-02T12:55:00Z
1
value 0.00962
scoring_system epss
scoring_elements 0.76487
published_at 2026-04-04T12:55:00Z
2
value 0.00962
scoring_system epss
scoring_elements 0.76469
published_at 2026-04-07T12:55:00Z
3
value 0.00962
scoring_system epss
scoring_elements 0.76501
published_at 2026-04-08T12:55:00Z
4
value 0.00962
scoring_system epss
scoring_elements 0.76513
published_at 2026-04-09T12:55:00Z
5
value 0.00962
scoring_system epss
scoring_elements 0.76539
published_at 2026-04-11T12:55:00Z
6
value 0.00962
scoring_system epss
scoring_elements 0.76518
published_at 2026-04-12T12:55:00Z
7
value 0.00962
scoring_system epss
scoring_elements 0.76512
published_at 2026-04-13T12:55:00Z
8
value 0.00962
scoring_system epss
scoring_elements 0.76553
published_at 2026-04-16T12:55:00Z
9
value 0.00962
scoring_system epss
scoring_elements 0.76556
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4349
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4349
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ervk-5a1a-s3cf
62
url VCID-etka-n2pe-zqh7
vulnerability_id VCID-etka-n2pe-zqh7
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5479
reference_id
reference_type
scores
0
value 0.00051
scoring_system epss
scoring_elements 0.15914
published_at 2026-04-02T12:55:00Z
1
value 0.00051
scoring_system epss
scoring_elements 0.15976
published_at 2026-04-04T12:55:00Z
2
value 0.00051
scoring_system epss
scoring_elements 0.15776
published_at 2026-04-07T12:55:00Z
3
value 0.00051
scoring_system epss
scoring_elements 0.15861
published_at 2026-04-08T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15924
published_at 2026-04-09T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15898
published_at 2026-04-11T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15859
published_at 2026-04-12T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.1579
published_at 2026-04-13T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.15713
published_at 2026-04-16T12:55:00Z
9
value 0.00051
scoring_system epss
scoring_elements 0.15722
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5479
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
16
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5479
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-etka-n2pe-zqh7
63
url VCID-eu1w-w8nj-fufb
vulnerability_id VCID-eu1w-w8nj-fufb
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4363
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.48974
published_at 2026-04-02T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.49
published_at 2026-04-04T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.48954
published_at 2026-04-07T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.49008
published_at 2026-04-08T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.49004
published_at 2026-04-09T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.49021
published_at 2026-04-11T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48994
published_at 2026-04-12T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.49001
published_at 2026-04-13T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.49046
published_at 2026-04-16T12:55:00Z
9
value 0.00256
scoring_system epss
scoring_elements 0.49042
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4363
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4363
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eu1w-w8nj-fufb
64
url VCID-f81v-9fv8-93cd
vulnerability_id VCID-f81v-9fv8-93cd
summary
Out-of-bounds Write
Heap buffer overflow in vp8 encoding in libvpx in Google Chrome prior to 117.0.5938.132 and libvpx 1.13.1 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5217.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-5217.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5217
reference_id
reference_type
scores
0
value 0.03573
scoring_system epss
scoring_elements 0.87744
published_at 2026-04-18T12:55:00Z
1
value 0.03573
scoring_system epss
scoring_elements 0.87722
published_at 2026-04-08T12:55:00Z
2
value 0.03573
scoring_system epss
scoring_elements 0.87728
published_at 2026-04-09T12:55:00Z
3
value 0.03573
scoring_system epss
scoring_elements 0.8774
published_at 2026-04-11T12:55:00Z
4
value 0.03573
scoring_system epss
scoring_elements 0.87733
published_at 2026-04-12T12:55:00Z
5
value 0.03573
scoring_system epss
scoring_elements 0.87731
published_at 2026-04-13T12:55:00Z
6
value 0.03573
scoring_system epss
scoring_elements 0.87745
published_at 2026-04-16T12:55:00Z
7
value 0.049
scoring_system epss
scoring_elements 0.89562
published_at 2026-04-02T12:55:00Z
8
value 0.049
scoring_system epss
scoring_elements 0.89576
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5217
2
reference_url https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software
3
reference_url https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://arstechnica.com/security/2023/09/new-0-day-in-chrome-and-firefox-is-likely-to-plague-other-software/
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241191
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2241191
5
reference_url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_27.html
6
reference_url https://crbug.com/1486441
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://crbug.com/1486441
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5169
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5171
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5176
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5186
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5187
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
13
reference_url http://seclists.org/fulldisclosure/2023/Oct/12
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://seclists.org/fulldisclosure/2023/Oct/12
14
reference_url http://seclists.org/fulldisclosure/2023/Oct/16
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://seclists.org/fulldisclosure/2023/Oct/16
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://github.com/electron/electron
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron
17
reference_url https://github.com/electron/electron/pull/40022
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/40022
18
reference_url https://github.com/electron/electron/pull/40023
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/40023
19
reference_url https://github.com/electron/electron/pull/40024
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/40024
20
reference_url https://github.com/electron/electron/pull/40025
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/40025
21
reference_url https://github.com/electron/electron/pull/40026
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/pull/40026
22
reference_url https://github.com/electron/electron/releases/tag/v22.3.25
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/releases/tag/v22.3.25
23
reference_url https://github.com/electron/electron/releases/tag/v24.8.5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/releases/tag/v24.8.5
24
reference_url https://github.com/electron/electron/releases/tag/v25.8.4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/releases/tag/v25.8.4
25
reference_url https://github.com/electron/electron/releases/tag/v26.2.4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/releases/tag/v26.2.4
26
reference_url https://github.com/electron/electron/releases/tag/v27.0.0-beta.8
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/electron/electron/releases/tag/v27.0.0-beta.8
27
reference_url https://github.com/webmproject/libvpx/commit/3fbd1dca6a4d2dad332a2110d646e4ffef36d590
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://github.com/webmproject/libvpx/commit/3fbd1dca6a4d2dad332a2110d646e4ffef36d590
28
reference_url https://github.com/webmproject/libvpx/commit/af6dedd715f4307669366944cca6e0417b290282
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://github.com/webmproject/libvpx/commit/af6dedd715f4307669366944cca6e0417b290282
29
reference_url https://github.com/webmproject/libvpx/releases/tag/v1.13.1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://github.com/webmproject/libvpx/releases/tag/v1.13.1
30
reference_url https://github.com/webmproject/libvpx/tags
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://github.com/webmproject/libvpx/tags
31
reference_url https://lists.debian.org/debian-lts-announce/2023/09/msg00038.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.debian.org/debian-lts-announce/2023/09/msg00038.html
32
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00001.html
33
reference_url https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.debian.org/debian-lts-announce/2023/10/msg00015.html
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4MFWDFJSSIFKWKNOCTQCFUNZWAXUCSS4/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/55YVCZNAVY3Y5E4DWPWMX2SPKZ2E5SOV/
38
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD
39
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63
40
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BCVSHVX2RFBU3RMCUFSATVQEJUFD4Q63/
41
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6
42
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWEJYS5NC7KVFYU3OAMPKQDYN6JQGVK6/
43
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB
44
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I
45
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WTRUIS3564P7ZLM2S2IH4Y4KZ327LI4I/
46
reference_url https://pastebin.com/TdkC4pDv
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://pastebin.com/TdkC4pDv
47
reference_url https://security.gentoo.org/glsa/202310-04
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://security.gentoo.org/glsa/202310-04
48
reference_url https://security.gentoo.org/glsa/202401-34
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://security.gentoo.org/glsa/202401-34
49
reference_url https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217
50
reference_url https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://stackdiary.com/google-discloses-a-webm-vp8-bug-tracked-as-cve-2023-5217/
51
reference_url https://support.apple.com/kb/HT213961
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://support.apple.com/kb/HT213961
52
reference_url https://support.apple.com/kb/HT213972
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://support.apple.com/kb/HT213972
53
reference_url https://twitter.com/maddiestone/status/1707163313711497266
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://twitter.com/maddiestone/status/1707163313711497266
54
reference_url https://www.debian.org/security/2023/dsa-5508
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://www.debian.org/security/2023/dsa-5508
55
reference_url https://www.debian.org/security/2023/dsa-5509
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://www.debian.org/security/2023/dsa-5509
56
reference_url https://www.debian.org/security/2023/dsa-5510
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://www.debian.org/security/2023/dsa-5510
57
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-44
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value critical
scoring_system generic_textual
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-44
58
reference_url https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://www.mozilla.org/en-US/security/advisories/mfsa2023-44/
59
reference_url https://www.openwall.com/lists/oss-security/2023/09/28/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://www.openwall.com/lists/oss-security/2023/09/28/5
60
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/5
61
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/6
62
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/1
63
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/11
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/11
64
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/12
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/12
65
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/14
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/14
66
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/2
67
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/7
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/7
68
reference_url http://www.openwall.com/lists/oss-security/2023/09/29/9
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/29/9
69
reference_url http://www.openwall.com/lists/oss-security/2023/09/30/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/30/1
70
reference_url http://www.openwall.com/lists/oss-security/2023/09/30/2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/30/2
71
reference_url http://www.openwall.com/lists/oss-security/2023/09/30/3
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/30/3
72
reference_url http://www.openwall.com/lists/oss-security/2023/09/30/4
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/30/4
73
reference_url http://www.openwall.com/lists/oss-security/2023/09/30/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/09/30/5
74
reference_url http://www.openwall.com/lists/oss-security/2023/10/01/1
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/10/01/1
75
reference_url http://www.openwall.com/lists/oss-security/2023/10/01/2
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/10/01/2
76
reference_url http://www.openwall.com/lists/oss-security/2023/10/01/5
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/10/01/5
77
reference_url http://www.openwall.com/lists/oss-security/2023/10/02/6
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/10/02/6
78
reference_url http://www.openwall.com/lists/oss-security/2023/10/03/11
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url http://www.openwall.com/lists/oss-security/2023/10/03/11
79
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053182
reference_id 1053182
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1053182
80
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
reference_id AY642Z6JZODQJE7Z62CFREVUHEGCXGPD
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AY642Z6JZODQJE7Z62CFREVUHEGCXGPD/
81
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-5217
reference_id CVE-2023-5217
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-5217
82
reference_url https://security-tracker.debian.org/tracker/CVE-2023-5217
reference_id CVE-2023-5217
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://security-tracker.debian.org/tracker/CVE-2023-5217
83
reference_url https://github.com/advisories/GHSA-qqvq-6xgj-jw8g
reference_id GHSA-qqvq-6xgj-jw8g
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qqvq-6xgj-jw8g
84
reference_url https://access.redhat.com/errata/RHSA-2023:5426
reference_id RHSA-2023:5426
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5426
85
reference_url https://access.redhat.com/errata/RHSA-2023:5427
reference_id RHSA-2023:5427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5427
86
reference_url https://access.redhat.com/errata/RHSA-2023:5428
reference_id RHSA-2023:5428
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5428
87
reference_url https://access.redhat.com/errata/RHSA-2023:5429
reference_id RHSA-2023:5429
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5429
88
reference_url https://access.redhat.com/errata/RHSA-2023:5430
reference_id RHSA-2023:5430
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5430
89
reference_url https://access.redhat.com/errata/RHSA-2023:5432
reference_id RHSA-2023:5432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5432
90
reference_url https://access.redhat.com/errata/RHSA-2023:5433
reference_id RHSA-2023:5433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5433
91
reference_url https://access.redhat.com/errata/RHSA-2023:5434
reference_id RHSA-2023:5434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5434
92
reference_url https://access.redhat.com/errata/RHSA-2023:5435
reference_id RHSA-2023:5435
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5435
93
reference_url https://access.redhat.com/errata/RHSA-2023:5436
reference_id RHSA-2023:5436
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5436
94
reference_url https://access.redhat.com/errata/RHSA-2023:5437
reference_id RHSA-2023:5437
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5437
95
reference_url https://access.redhat.com/errata/RHSA-2023:5438
reference_id RHSA-2023:5438
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5438
96
reference_url https://access.redhat.com/errata/RHSA-2023:5439
reference_id RHSA-2023:5439
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5439
97
reference_url https://access.redhat.com/errata/RHSA-2023:5440
reference_id RHSA-2023:5440
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5440
98
reference_url https://access.redhat.com/errata/RHSA-2023:5475
reference_id RHSA-2023:5475
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5475
99
reference_url https://access.redhat.com/errata/RHSA-2023:5477
reference_id RHSA-2023:5477
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5477
100
reference_url https://access.redhat.com/errata/RHSA-2023:5534
reference_id RHSA-2023:5534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5534
101
reference_url https://access.redhat.com/errata/RHSA-2023:5535
reference_id RHSA-2023:5535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5535
102
reference_url https://access.redhat.com/errata/RHSA-2023:5536
reference_id RHSA-2023:5536
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5536
103
reference_url https://access.redhat.com/errata/RHSA-2023:5537
reference_id RHSA-2023:5537
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5537
104
reference_url https://access.redhat.com/errata/RHSA-2023:5538
reference_id RHSA-2023:5538
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5538
105
reference_url https://access.redhat.com/errata/RHSA-2023:5539
reference_id RHSA-2023:5539
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5539
106
reference_url https://access.redhat.com/errata/RHSA-2023:5540
reference_id RHSA-2023:5540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:5540
107
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/
reference_id TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-11-15T16:38:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TE7F54W5O5RS4ZMAAC7YK3CZWQXIDSKB/
108
reference_url https://usn.ubuntu.com/6403-1/
reference_id USN-6403-1
reference_type
scores
url https://usn.ubuntu.com/6403-1/
109
reference_url https://usn.ubuntu.com/6403-2/
reference_id USN-6403-2
reference_type
scores
url https://usn.ubuntu.com/6403-2/
110
reference_url https://usn.ubuntu.com/6403-3/
reference_id USN-6403-3
reference_type
scores
url https://usn.ubuntu.com/6403-3/
111
reference_url https://usn.ubuntu.com/6404-1/
reference_id USN-6404-1
reference_type
scores
url https://usn.ubuntu.com/6404-1/
112
reference_url https://usn.ubuntu.com/6405-1/
reference_id USN-6405-1
reference_type
scores
url https://usn.ubuntu.com/6405-1/
113
reference_url https://usn.ubuntu.com/7172-1/
reference_id USN-7172-1
reference_type
scores
url https://usn.ubuntu.com/7172-1/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5217, GHSA-qqvq-6xgj-jw8g
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f81v-9fv8-93cd
65
url VCID-f8gf-deg9-k3b7
vulnerability_id VCID-f8gf-deg9-k3b7
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5477
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10268
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10333
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10231
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10305
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10366
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10397
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10356
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10334
published_at 2026-04-13T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10208
published_at 2026-04-16T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.10181
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5477
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
16
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5477
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8gf-deg9-k3b7
66
url VCID-famc-axyn-e3ga
vulnerability_id VCID-famc-axyn-e3ga
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2931
reference_id
reference_type
scores
0
value 0.00366
scoring_system epss
scoring_elements 0.58636
published_at 2026-04-11T12:55:00Z
1
value 0.00366
scoring_system epss
scoring_elements 0.5857
published_at 2026-04-02T12:55:00Z
2
value 0.00366
scoring_system epss
scoring_elements 0.58596
published_at 2026-04-13T12:55:00Z
3
value 0.00366
scoring_system epss
scoring_elements 0.58591
published_at 2026-04-04T12:55:00Z
4
value 0.00366
scoring_system epss
scoring_elements 0.58561
published_at 2026-04-07T12:55:00Z
5
value 0.00366
scoring_system epss
scoring_elements 0.58612
published_at 2026-04-08T12:55:00Z
6
value 0.00366
scoring_system epss
scoring_elements 0.58619
published_at 2026-04-09T12:55:00Z
7
value 0.00366
scoring_system epss
scoring_elements 0.58616
published_at 2026-04-12T12:55:00Z
8
value 0.00366
scoring_system epss
scoring_elements 0.58634
published_at 2026-04-18T12:55:00Z
9
value 0.00366
scoring_system epss
scoring_elements 0.58629
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2931
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1444238
reference_id 1444238
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:11Z/
url https://crbug.com/1444238
16
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:11Z/
url https://www.debian.org/security/2023/dsa-5418
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:11Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:11Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2931
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-famc-axyn-e3ga
67
url VCID-fhe4-nbyu-9bdy
vulnerability_id VCID-fhe4-nbyu-9bdy
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5850
reference_id
reference_type
scores
0
value 0.00864
scoring_system epss
scoring_elements 0.75044
published_at 2026-04-02T12:55:00Z
1
value 0.00864
scoring_system epss
scoring_elements 0.75073
published_at 2026-04-04T12:55:00Z
2
value 0.00864
scoring_system epss
scoring_elements 0.7505
published_at 2026-04-07T12:55:00Z
3
value 0.00864
scoring_system epss
scoring_elements 0.75084
published_at 2026-04-08T12:55:00Z
4
value 0.00864
scoring_system epss
scoring_elements 0.75095
published_at 2026-04-09T12:55:00Z
5
value 0.00864
scoring_system epss
scoring_elements 0.75117
published_at 2026-04-11T12:55:00Z
6
value 0.00864
scoring_system epss
scoring_elements 0.75096
published_at 2026-04-12T12:55:00Z
7
value 0.00864
scoring_system epss
scoring_elements 0.75086
published_at 2026-04-13T12:55:00Z
8
value 0.00864
scoring_system epss
scoring_elements 0.75124
published_at 2026-04-16T12:55:00Z
9
value 0.00864
scoring_system epss
scoring_elements 0.7513
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5850
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
19
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5850
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhe4-nbyu-9bdy
68
url VCID-fhj1-jc1b-77gt
vulnerability_id VCID-fhj1-jc1b-77gt
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4068
reference_id
reference_type
scores
0
value 0.03356
scoring_system epss
scoring_elements 0.8729
published_at 2026-04-02T12:55:00Z
1
value 0.03356
scoring_system epss
scoring_elements 0.87306
published_at 2026-04-04T12:55:00Z
2
value 0.03356
scoring_system epss
scoring_elements 0.87305
published_at 2026-04-07T12:55:00Z
3
value 0.03356
scoring_system epss
scoring_elements 0.87324
published_at 2026-04-08T12:55:00Z
4
value 0.03356
scoring_system epss
scoring_elements 0.87331
published_at 2026-04-09T12:55:00Z
5
value 0.03356
scoring_system epss
scoring_elements 0.87344
published_at 2026-04-11T12:55:00Z
6
value 0.03356
scoring_system epss
scoring_elements 0.87338
published_at 2026-04-12T12:55:00Z
7
value 0.03356
scoring_system epss
scoring_elements 0.87334
published_at 2026-04-13T12:55:00Z
8
value 0.03356
scoring_system epss
scoring_elements 0.87349
published_at 2026-04-16T12:55:00Z
9
value 0.03356
scoring_system epss
scoring_elements 0.87352
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4068
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4068
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fhj1-jc1b-77gt
69
url VCID-fkv2-fxnb-efh3
vulnerability_id VCID-fkv2-fxnb-efh3
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6346
reference_id
reference_type
scores
0
value 0.00356
scoring_system epss
scoring_elements 0.57888
published_at 2026-04-02T12:55:00Z
1
value 0.00356
scoring_system epss
scoring_elements 0.57908
published_at 2026-04-04T12:55:00Z
2
value 0.00356
scoring_system epss
scoring_elements 0.57883
published_at 2026-04-07T12:55:00Z
3
value 0.00356
scoring_system epss
scoring_elements 0.57938
published_at 2026-04-08T12:55:00Z
4
value 0.00356
scoring_system epss
scoring_elements 0.5794
published_at 2026-04-09T12:55:00Z
5
value 0.00356
scoring_system epss
scoring_elements 0.57956
published_at 2026-04-11T12:55:00Z
6
value 0.00356
scoring_system epss
scoring_elements 0.57933
published_at 2026-04-12T12:55:00Z
7
value 0.00356
scoring_system epss
scoring_elements 0.57913
published_at 2026-04-13T12:55:00Z
8
value 0.00356
scoring_system epss
scoring_elements 0.57944
published_at 2026-04-16T12:55:00Z
9
value 0.00356
scoring_system epss
scoring_elements 0.57942
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6346
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6346
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fkv2-fxnb-efh3
70
url VCID-fw1e-jhna-8yfm
vulnerability_id VCID-fw1e-jhna-8yfm
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4907
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50619
published_at 2026-04-18T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-08T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50568
published_at 2026-04-09T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.5061
published_at 2026-04-11T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50587
published_at 2026-04-12T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50572
published_at 2026-04-13T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50614
published_at 2026-04-16T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-02T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50563
published_at 2026-04-04T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50516
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4907
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
14
reference_url https://crbug.com/1462104
reference_id 1462104
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:32:01Z/
url https://crbug.com/1462104
15
reference_url https://www.debian.org/security/2023/dsa-5499
reference_id dsa-5499
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:32:01Z/
url https://www.debian.org/security/2023/dsa-5499
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:32:01Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
17
reference_url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T13:32:01Z/
url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4907
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fw1e-jhna-8yfm
71
url VCID-fwv3-u6wm-p7c2
vulnerability_id VCID-fwv3-u6wm-p7c2
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4427
reference_id
reference_type
scores
0
value 0.79336
scoring_system epss
scoring_elements 0.99068
published_at 2026-04-02T12:55:00Z
1
value 0.79336
scoring_system epss
scoring_elements 0.99072
published_at 2026-04-04T12:55:00Z
2
value 0.79336
scoring_system epss
scoring_elements 0.99074
published_at 2026-04-07T12:55:00Z
3
value 0.79336
scoring_system epss
scoring_elements 0.99075
published_at 2026-04-08T12:55:00Z
4
value 0.79336
scoring_system epss
scoring_elements 0.99076
published_at 2026-04-11T12:55:00Z
5
value 0.79336
scoring_system epss
scoring_elements 0.99077
published_at 2026-04-13T12:55:00Z
6
value 0.79336
scoring_system epss
scoring_elements 0.99078
published_at 2026-04-16T12:55:00Z
7
value 0.79336
scoring_system epss
scoring_elements 0.99079
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4427
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4428
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4431
6
reference_url https://crbug.com/1470668
reference_id 1470668
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:45:12Z/
url https://crbug.com/1470668
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
reference_id 27NR3KG553CG6LGPMP6SHWEVHTYPL6RC
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:45:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
8
reference_url https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html
reference_id chrome-desktop-stable-update.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:45:12Z/
url https://chromereleases.googleblog.com/2023/08/chrome-desktop-stable-update.html
9
reference_url http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html
reference_id Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:45:12Z/
url http://packetstormsecurity.com/files/174951/Chrome-ReduceJSLoadPropertyWithEnumeratedKey-Out-Of-Bounds-Access.html
10
reference_url https://www.debian.org/security/2023/dsa-5483
reference_id dsa-5483
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:45:12Z/
url https://www.debian.org/security/2023/dsa-5483
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T19:45:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4427
risk_score 0.3
exploitability 0.5
weighted_severity 0.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fwv3-u6wm-p7c2
72
url VCID-fx3j-4fvw-6bgk
vulnerability_id VCID-fx3j-4fvw-6bgk
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5484
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36458
published_at 2026-04-02T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36491
published_at 2026-04-04T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.36326
published_at 2026-04-07T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36375
published_at 2026-04-08T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36395
published_at 2026-04-09T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.36403
published_at 2026-04-11T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36368
published_at 2026-04-12T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.36346
published_at 2026-04-13T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36387
published_at 2026-04-16T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.3637
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5484
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
16
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5484
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fx3j-4fvw-6bgk
73
url VCID-g5ks-nfrb-b7fd
vulnerability_id VCID-g5ks-nfrb-b7fd
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4906
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15625
published_at 2026-04-02T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15692
published_at 2026-04-04T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15491
published_at 2026-04-07T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15578
published_at 2026-04-08T12:55:00Z
4
value 0.0005
scoring_system epss
scoring_elements 0.15632
published_at 2026-04-09T12:55:00Z
5
value 0.0005
scoring_system epss
scoring_elements 0.15599
published_at 2026-04-11T12:55:00Z
6
value 0.0005
scoring_system epss
scoring_elements 0.15562
published_at 2026-04-12T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15497
published_at 2026-04-13T12:55:00Z
8
value 0.0005
scoring_system epss
scoring_elements 0.15423
published_at 2026-04-16T12:55:00Z
9
value 0.0005
scoring_system epss
scoring_elements 0.15429
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4906
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4906
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g5ks-nfrb-b7fd
74
url VCID-g7kr-qa6k-rybq
vulnerability_id VCID-g7kr-qa6k-rybq
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4071
reference_id
reference_type
scores
0
value 0.00496
scoring_system epss
scoring_elements 0.65749
published_at 2026-04-02T12:55:00Z
1
value 0.00496
scoring_system epss
scoring_elements 0.65779
published_at 2026-04-04T12:55:00Z
2
value 0.00496
scoring_system epss
scoring_elements 0.65744
published_at 2026-04-07T12:55:00Z
3
value 0.00496
scoring_system epss
scoring_elements 0.65797
published_at 2026-04-08T12:55:00Z
4
value 0.00496
scoring_system epss
scoring_elements 0.65808
published_at 2026-04-09T12:55:00Z
5
value 0.00496
scoring_system epss
scoring_elements 0.65828
published_at 2026-04-11T12:55:00Z
6
value 0.00496
scoring_system epss
scoring_elements 0.65814
published_at 2026-04-12T12:55:00Z
7
value 0.00496
scoring_system epss
scoring_elements 0.65784
published_at 2026-04-13T12:55:00Z
8
value 0.00496
scoring_system epss
scoring_elements 0.65819
published_at 2026-04-16T12:55:00Z
9
value 0.00496
scoring_system epss
scoring_elements 0.65833
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4071
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4071
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g7kr-qa6k-rybq
75
url VCID-grtw-qkp5-w3dk
vulnerability_id VCID-grtw-qkp5-w3dk
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4351
reference_id
reference_type
scores
0
value 0.00717
scoring_system epss
scoring_elements 0.72342
published_at 2026-04-02T12:55:00Z
1
value 0.00717
scoring_system epss
scoring_elements 0.7236
published_at 2026-04-04T12:55:00Z
2
value 0.00717
scoring_system epss
scoring_elements 0.72338
published_at 2026-04-07T12:55:00Z
3
value 0.00717
scoring_system epss
scoring_elements 0.72377
published_at 2026-04-08T12:55:00Z
4
value 0.00717
scoring_system epss
scoring_elements 0.72389
published_at 2026-04-09T12:55:00Z
5
value 0.00717
scoring_system epss
scoring_elements 0.72412
published_at 2026-04-11T12:55:00Z
6
value 0.00717
scoring_system epss
scoring_elements 0.72396
published_at 2026-04-12T12:55:00Z
7
value 0.00717
scoring_system epss
scoring_elements 0.72383
published_at 2026-04-13T12:55:00Z
8
value 0.00717
scoring_system epss
scoring_elements 0.72425
published_at 2026-04-16T12:55:00Z
9
value 0.00717
scoring_system epss
scoring_elements 0.72434
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4351
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4351
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-grtw-qkp5-w3dk
76
url VCID-gsvw-2g76-wkcv
vulnerability_id VCID-gsvw-2g76-wkcv
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3732
reference_id
reference_type
scores
0
value 0.00699
scoring_system epss
scoring_elements 0.71932
published_at 2026-04-02T12:55:00Z
1
value 0.00699
scoring_system epss
scoring_elements 0.71952
published_at 2026-04-04T12:55:00Z
2
value 0.00699
scoring_system epss
scoring_elements 0.71929
published_at 2026-04-07T12:55:00Z
3
value 0.00699
scoring_system epss
scoring_elements 0.71967
published_at 2026-04-08T12:55:00Z
4
value 0.00699
scoring_system epss
scoring_elements 0.7198
published_at 2026-04-09T12:55:00Z
5
value 0.00699
scoring_system epss
scoring_elements 0.72003
published_at 2026-04-11T12:55:00Z
6
value 0.00699
scoring_system epss
scoring_elements 0.71987
published_at 2026-04-12T12:55:00Z
7
value 0.00699
scoring_system epss
scoring_elements 0.71971
published_at 2026-04-13T12:55:00Z
8
value 0.00699
scoring_system epss
scoring_elements 0.72012
published_at 2026-04-16T12:55:00Z
9
value 0.00699
scoring_system epss
scoring_elements 0.72019
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3732
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3732
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gsvw-2g76-wkcv
77
url VCID-h1jn-51en-hqh2
vulnerability_id VCID-h1jn-51en-hqh2
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4572
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55666
published_at 2026-04-02T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55689
published_at 2026-04-04T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55667
published_at 2026-04-07T12:55:00Z
3
value 0.00328
scoring_system epss
scoring_elements 0.55719
published_at 2026-04-08T12:55:00Z
4
value 0.00328
scoring_system epss
scoring_elements 0.55722
published_at 2026-04-09T12:55:00Z
5
value 0.00328
scoring_system epss
scoring_elements 0.55731
published_at 2026-04-11T12:55:00Z
6
value 0.00328
scoring_system epss
scoring_elements 0.55711
published_at 2026-04-12T12:55:00Z
7
value 0.00328
scoring_system epss
scoring_elements 0.55694
published_at 2026-04-13T12:55:00Z
8
value 0.00328
scoring_system epss
scoring_elements 0.55733
published_at 2026-04-16T12:55:00Z
9
value 0.00328
scoring_system epss
scoring_elements 0.55737
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4572
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4572
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4572
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h1jn-51en-hqh2
78
url VCID-jhg7-k3ms-bfaj
vulnerability_id VCID-jhg7-k3ms-bfaj
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4077
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36529
published_at 2026-04-02T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36563
published_at 2026-04-04T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.364
published_at 2026-04-07T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36451
published_at 2026-04-08T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36472
published_at 2026-04-09T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.3648
published_at 2026-04-11T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36444
published_at 2026-04-12T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.36423
published_at 2026-04-13T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36463
published_at 2026-04-16T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.36447
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4077
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4077
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jhg7-k3ms-bfaj
79
url VCID-k3n7-zdsw-eyg6
vulnerability_id VCID-k3n7-zdsw-eyg6
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6706
reference_id
reference_type
scores
0
value 0.00337
scoring_system epss
scoring_elements 0.56617
published_at 2026-04-18T12:55:00Z
1
value 0.00337
scoring_system epss
scoring_elements 0.56569
published_at 2026-04-02T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.5659
published_at 2026-04-04T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.56568
published_at 2026-04-07T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.5662
published_at 2026-04-08T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56624
published_at 2026-04-09T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56633
published_at 2026-04-11T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56609
published_at 2026-04-12T12:55:00Z
8
value 0.00337
scoring_system epss
scoring_elements 0.56587
published_at 2026-04-13T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6706
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1500921
reference_id 1500921
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/
url https://crbug.com/1500921
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6706
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3n7-zdsw-eyg6
80
url VCID-kfc3-d8nt-m7e1
vulnerability_id VCID-kfc3-d8nt-m7e1
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5482
reference_id
reference_type
scores
0
value 0.13863
scoring_system epss
scoring_elements 0.94279
published_at 2026-04-07T12:55:00Z
1
value 0.13863
scoring_system epss
scoring_elements 0.94297
published_at 2026-04-12T12:55:00Z
2
value 0.13863
scoring_system epss
scoring_elements 0.94296
published_at 2026-04-11T12:55:00Z
3
value 0.13863
scoring_system epss
scoring_elements 0.94293
published_at 2026-04-09T12:55:00Z
4
value 0.13863
scoring_system epss
scoring_elements 0.94289
published_at 2026-04-08T12:55:00Z
5
value 0.13863
scoring_system epss
scoring_elements 0.94278
published_at 2026-04-04T12:55:00Z
6
value 0.13863
scoring_system epss
scoring_elements 0.94266
published_at 2026-04-02T12:55:00Z
7
value 0.13863
scoring_system epss
scoring_elements 0.94318
published_at 2026-04-18T12:55:00Z
8
value 0.13863
scoring_system epss
scoring_elements 0.94312
published_at 2026-04-16T12:55:00Z
9
value 0.13863
scoring_system epss
scoring_elements 0.94298
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5482
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://crbug.com/1492381
reference_id 1492381
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:04Z/
url https://crbug.com/1492381
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
reference_id 2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
20
reference_url https://www.debian.org/security/2023/dsa-5546
reference_id dsa-5546
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:04Z/
url https://www.debian.org/security/2023/dsa-5546
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
reference_id EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
22
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:04Z/
url https://security.gentoo.org/glsa/202311-11
23
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:04Z/
url https://security.gentoo.org/glsa/202312-07
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
reference_id PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
25
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
reference_id stable-channel-update-for-desktop_31.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:04Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5482
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kfc3-d8nt-m7e1
81
url VCID-kfq3-arar-5bd8
vulnerability_id VCID-kfq3-arar-5bd8
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5472
reference_id
reference_type
scores
0
value 0.0112
scoring_system epss
scoring_elements 0.78201
published_at 2026-04-07T12:55:00Z
1
value 0.0112
scoring_system epss
scoring_elements 0.78188
published_at 2026-04-02T12:55:00Z
2
value 0.0112
scoring_system epss
scoring_elements 0.78267
published_at 2026-04-18T12:55:00Z
3
value 0.0112
scoring_system epss
scoring_elements 0.78242
published_at 2026-04-12T12:55:00Z
4
value 0.0112
scoring_system epss
scoring_elements 0.78259
published_at 2026-04-11T12:55:00Z
5
value 0.0112
scoring_system epss
scoring_elements 0.78233
published_at 2026-04-09T12:55:00Z
6
value 0.0112
scoring_system epss
scoring_elements 0.78227
published_at 2026-04-08T12:55:00Z
7
value 0.0112
scoring_system epss
scoring_elements 0.78218
published_at 2026-04-04T12:55:00Z
8
value 0.0112
scoring_system epss
scoring_elements 0.78269
published_at 2026-04-16T12:55:00Z
9
value 0.0112
scoring_system epss
scoring_elements 0.78238
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5472
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5472
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5472
2
reference_url https://crbug.com/1491296
reference_id 1491296
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:17Z/
url https://crbug.com/1491296
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5TWIUD4VIISLZWEQ4WLWFZT34T3KOXZB/
reference_id 5TWIUD4VIISLZWEQ4WLWFZT34T3KOXZB
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5TWIUD4VIISLZWEQ4WLWFZT34T3KOXZB/
4
reference_url https://www.debian.org/security/2023/dsa-5536
reference_id dsa-5536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:17Z/
url https://www.debian.org/security/2023/dsa-5536
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA6HMWNOYQ56R35MHW77GVW7373Z4RSN/
reference_id RA6HMWNOYQ56R35MHW77GVW7373Z4RSN
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RA6HMWNOYQ56R35MHW77GVW7373Z4RSN/
6
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_24.html
reference_id stable-channel-update-for-desktop_24.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:17Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_24.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDMQG42VVOZ5USSI4NSNT3VJPGBPNSIW/
reference_id TDMQG42VVOZ5USSI4NSNT3VJPGBPNSIW
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TDMQG42VVOZ5USSI4NSNT3VJPGBPNSIW/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5472
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kfq3-arar-5bd8
82
url VCID-kqww-44jn-1qh7
vulnerability_id VCID-kqww-44jn-1qh7
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3214
reference_id
reference_type
scores
0
value 0.01734
scoring_system epss
scoring_elements 0.82424
published_at 2026-04-07T12:55:00Z
1
value 0.01734
scoring_system epss
scoring_elements 0.8241
published_at 2026-04-02T12:55:00Z
2
value 0.01734
scoring_system epss
scoring_elements 0.82451
published_at 2026-04-08T12:55:00Z
3
value 0.01734
scoring_system epss
scoring_elements 0.82427
published_at 2026-04-04T12:55:00Z
4
value 0.01847
scoring_system epss
scoring_elements 0.82984
published_at 2026-04-13T12:55:00Z
5
value 0.01847
scoring_system epss
scoring_elements 0.82988
published_at 2026-04-12T12:55:00Z
6
value 0.01847
scoring_system epss
scoring_elements 0.82994
published_at 2026-04-11T12:55:00Z
7
value 0.01847
scoring_system epss
scoring_elements 0.82978
published_at 2026-04-09T12:55:00Z
8
value 0.01847
scoring_system epss
scoring_elements 0.83023
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3214
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3215
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3216
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3217
5
reference_url https://crbug.com/1450568
reference_id 1450568
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:50Z/
url https://crbug.com/1450568
6
reference_url https://www.debian.org/security/2023/dsa-5428
reference_id dsa-5428
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:50Z/
url https://www.debian.org/security/2023/dsa-5428
7
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:50Z/
url https://security.gentoo.org/glsa/202311-11
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/
reference_id JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/
reference_id O362DC3ZCFRXVHOXMPIL73YOWABQEUYD
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:50Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/
10
reference_url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
reference_id stable-channel-update-for-desktop_13.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:50Z/
url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3214
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kqww-44jn-1qh7
83
url VCID-mb2p-ggju-4qd3
vulnerability_id VCID-mb2p-ggju-4qd3
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4763
reference_id
reference_type
scores
0
value 0.00618
scoring_system epss
scoring_elements 0.69914
published_at 2026-04-04T12:55:00Z
1
value 0.00618
scoring_system epss
scoring_elements 0.69899
published_at 2026-04-02T12:55:00Z
2
value 0.00618
scoring_system epss
scoring_elements 0.70004
published_at 2026-04-18T12:55:00Z
3
value 0.00618
scoring_system epss
scoring_elements 0.69994
published_at 2026-04-16T12:55:00Z
4
value 0.00618
scoring_system epss
scoring_elements 0.69951
published_at 2026-04-13T12:55:00Z
5
value 0.00618
scoring_system epss
scoring_elements 0.69964
published_at 2026-04-12T12:55:00Z
6
value 0.00618
scoring_system epss
scoring_elements 0.6998
published_at 2026-04-11T12:55:00Z
7
value 0.00618
scoring_system epss
scoring_elements 0.69956
published_at 2026-04-09T12:55:00Z
8
value 0.00618
scoring_system epss
scoring_elements 0.6994
published_at 2026-04-08T12:55:00Z
9
value 0.00618
scoring_system epss
scoring_elements 0.69892
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4763
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4762
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4763
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4764
5
reference_url https://crbug.com/1469928
reference_id 1469928
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:24Z/
url https://crbug.com/1469928
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
reference_id 27NR3KG553CG6LGPMP6SHWEVHTYPL6RC
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
7
reference_url https://www.debian.org/security/2023/dsa-5491
reference_id dsa-5491
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:24Z/
url https://www.debian.org/security/2023/dsa-5491
8
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:24Z/
url https://security.gentoo.org/glsa/202311-11
9
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:24Z/
url https://security.gentoo.org/glsa/202312-07
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
11
reference_url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:24Z/
url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4763
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mb2p-ggju-4qd3
84
url VCID-mehh-wxgm-cbgn
vulnerability_id VCID-mehh-wxgm-cbgn
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3734
reference_id
reference_type
scores
0
value 0.00173
scoring_system epss
scoring_elements 0.38679
published_at 2026-04-18T12:55:00Z
1
value 0.00173
scoring_system epss
scoring_elements 0.3868
published_at 2026-04-12T12:55:00Z
2
value 0.00173
scoring_system epss
scoring_elements 0.38654
published_at 2026-04-13T12:55:00Z
3
value 0.00173
scoring_system epss
scoring_elements 0.38701
published_at 2026-04-16T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38694
published_at 2026-04-02T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38717
published_at 2026-04-04T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.38646
published_at 2026-04-07T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38697
published_at 2026-04-08T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.38707
published_at 2026-04-09T12:55:00Z
9
value 0.00173
scoring_system epss
scoring_elements 0.38718
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3734
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
14
reference_url https://crbug.com/1450376
reference_id 1450376
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T17:23:52Z/
url https://crbug.com/1450376
15
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
reference_id PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T17:23:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PQKT7EGDD2P3L7S3NXEDDRCPK4NNZNWJ/
16
reference_url https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-01T17:23:52Z/
url https://chromereleases.googleblog.com/2023/07/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3734
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mehh-wxgm-cbgn
85
url VCID-ms8z-ynzm-p3bn
vulnerability_id VCID-ms8z-ynzm-p3bn
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4900
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-02T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50563
published_at 2026-04-04T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50516
published_at 2026-04-07T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-08T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50568
published_at 2026-04-09T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.5061
published_at 2026-04-11T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50587
published_at 2026-04-12T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50572
published_at 2026-04-13T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50614
published_at 2026-04-16T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50619
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4900
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4900
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ms8z-ynzm-p3bn
86
url VCID-nx63-bqh3-8fes
vulnerability_id VCID-nx63-bqh3-8fes
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6351
reference_id
reference_type
scores
0
value 0.0021
scoring_system epss
scoring_elements 0.43377
published_at 2026-04-02T12:55:00Z
1
value 0.0021
scoring_system epss
scoring_elements 0.43405
published_at 2026-04-04T12:55:00Z
2
value 0.0021
scoring_system epss
scoring_elements 0.43343
published_at 2026-04-07T12:55:00Z
3
value 0.0021
scoring_system epss
scoring_elements 0.43394
published_at 2026-04-08T12:55:00Z
4
value 0.0021
scoring_system epss
scoring_elements 0.43408
published_at 2026-04-09T12:55:00Z
5
value 0.0021
scoring_system epss
scoring_elements 0.43427
published_at 2026-04-11T12:55:00Z
6
value 0.0021
scoring_system epss
scoring_elements 0.43396
published_at 2026-04-12T12:55:00Z
7
value 0.0021
scoring_system epss
scoring_elements 0.4338
published_at 2026-04-13T12:55:00Z
8
value 0.0021
scoring_system epss
scoring_elements 0.43439
published_at 2026-04-16T12:55:00Z
9
value 0.0021
scoring_system epss
scoring_elements 0.43428
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6351
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6351
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nx63-bqh3-8fes
87
url VCID-p3y5-dg2h-5yfp
vulnerability_id VCID-p3y5-dg2h-5yfp
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-7024
reference_id
reference_type
scores
0
value 0.01298
scoring_system epss
scoring_elements 0.79689
published_at 2026-04-04T12:55:00Z
1
value 0.01298
scoring_system epss
scoring_elements 0.79668
published_at 2026-04-02T12:55:00Z
2
value 0.02866
scoring_system epss
scoring_elements 0.86222
published_at 2026-04-07T12:55:00Z
3
value 0.02866
scoring_system epss
scoring_elements 0.8626
published_at 2026-04-13T12:55:00Z
4
value 0.02866
scoring_system epss
scoring_elements 0.86264
published_at 2026-04-12T12:55:00Z
5
value 0.02866
scoring_system epss
scoring_elements 0.86266
published_at 2026-04-11T12:55:00Z
6
value 0.02866
scoring_system epss
scoring_elements 0.86252
published_at 2026-04-09T12:55:00Z
7
value 0.02866
scoring_system epss
scoring_elements 0.86241
published_at 2026-04-08T12:55:00Z
8
value 0.02866
scoring_system epss
scoring_elements 0.8628
published_at 2026-04-18T12:55:00Z
9
value 0.02866
scoring_system epss
scoring_elements 0.86275
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-7024
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7024
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7024
2
reference_url https://crbug.com/1513170
reference_id 1513170
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-23T05:01:04Z/
url https://crbug.com/1513170
3
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3/
reference_id 6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-23T05:01:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6M6AJDHUL6EDPURWQXGLUFJNDE7SOJT3/
4
reference_url https://www.debian.org/security/2023/dsa-5585
reference_id dsa-5585
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-23T05:01:04Z/
url https://www.debian.org/security/2023/dsa-5585
5
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
6
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html
reference_id stable-channel-update-for-desktop_20.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-23T05:01:04Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_20.html
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR/
reference_id U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-23T05:01:04Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U6JL4VHZMHFGEGQYTF74533ZNRWMCMMR/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-7024
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p3y5-dg2h-5yfp
88
url VCID-pm77-zumu-r7ff
vulnerability_id VCID-pm77-zumu-r7ff
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6511
reference_id
reference_type
scores
0
value 0.00202
scoring_system epss
scoring_elements 0.42302
published_at 2026-04-18T12:55:00Z
1
value 0.00202
scoring_system epss
scoring_elements 0.42318
published_at 2026-04-09T12:55:00Z
2
value 0.00202
scoring_system epss
scoring_elements 0.4234
published_at 2026-04-11T12:55:00Z
3
value 0.00202
scoring_system epss
scoring_elements 0.42304
published_at 2026-04-12T12:55:00Z
4
value 0.00202
scoring_system epss
scoring_elements 0.42276
published_at 2026-04-13T12:55:00Z
5
value 0.00202
scoring_system epss
scoring_elements 0.42326
published_at 2026-04-16T12:55:00Z
6
value 0.00202
scoring_system epss
scoring_elements 0.42289
published_at 2026-04-02T12:55:00Z
7
value 0.00202
scoring_system epss
scoring_elements 0.42317
published_at 2026-04-04T12:55:00Z
8
value 0.00202
scoring_system epss
scoring_elements 0.42259
published_at 2026-04-07T12:55:00Z
9
value 0.00202
scoring_system epss
scoring_elements 0.4231
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6511
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
8
reference_url https://crbug.com/1478613
reference_id 1478613
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-07T19:21:57Z/
url https://crbug.com/1478613
9
reference_url https://www.debian.org/security/2023/dsa-5573
reference_id dsa-5573
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-07T19:21:57Z/
url https://www.debian.org/security/2023/dsa-5573
10
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/
reference_id MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-07T19:21:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMHY76AWPA46MAFXPWDGJX6FEGXZVR5Z/
12
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/
reference_id RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-07T19:21:57Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RI3UHCTFH6KWAJGDZ2TOLT6VHKW53WCC/
13
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-07T19:21:57Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6511
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pm77-zumu-r7ff
89
url VCID-pv9x-z3sx-2uf8
vulnerability_id VCID-pv9x-z3sx-2uf8
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5996
reference_id
reference_type
scores
0
value 0.0057
scoring_system epss
scoring_elements 0.68553
published_at 2026-04-02T12:55:00Z
1
value 0.0057
scoring_system epss
scoring_elements 0.68572
published_at 2026-04-04T12:55:00Z
2
value 0.0057
scoring_system epss
scoring_elements 0.6855
published_at 2026-04-07T12:55:00Z
3
value 0.0057
scoring_system epss
scoring_elements 0.68601
published_at 2026-04-13T12:55:00Z
4
value 0.0057
scoring_system epss
scoring_elements 0.68618
published_at 2026-04-09T12:55:00Z
5
value 0.0057
scoring_system epss
scoring_elements 0.68643
published_at 2026-04-11T12:55:00Z
6
value 0.0057
scoring_system epss
scoring_elements 0.68631
published_at 2026-04-12T12:55:00Z
7
value 0.0057
scoring_system epss
scoring_elements 0.68641
published_at 2026-04-16T12:55:00Z
8
value 0.0057
scoring_system epss
scoring_elements 0.68652
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5996
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5996
2
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
3
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5996
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pv9x-z3sx-2uf8
90
url VCID-q432-m3yj-uyee
vulnerability_id VCID-q432-m3yj-uyee
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5849
reference_id
reference_type
scores
0
value 0.01138
scoring_system epss
scoring_elements 0.78362
published_at 2026-04-07T12:55:00Z
1
value 0.01138
scoring_system epss
scoring_elements 0.78403
published_at 2026-04-12T12:55:00Z
2
value 0.01138
scoring_system epss
scoring_elements 0.7842
published_at 2026-04-11T12:55:00Z
3
value 0.01138
scoring_system epss
scoring_elements 0.78394
published_at 2026-04-09T12:55:00Z
4
value 0.01138
scoring_system epss
scoring_elements 0.78389
published_at 2026-04-08T12:55:00Z
5
value 0.01138
scoring_system epss
scoring_elements 0.78378
published_at 2026-04-04T12:55:00Z
6
value 0.01138
scoring_system epss
scoring_elements 0.78347
published_at 2026-04-02T12:55:00Z
7
value 0.01138
scoring_system epss
scoring_elements 0.78423
published_at 2026-04-18T12:55:00Z
8
value 0.01138
scoring_system epss
scoring_elements 0.78424
published_at 2026-04-16T12:55:00Z
9
value 0.01138
scoring_system epss
scoring_elements 0.78395
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5849
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://crbug.com/1492384
reference_id 1492384
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:03Z/
url https://crbug.com/1492384
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
reference_id 2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
20
reference_url https://www.debian.org/security/2023/dsa-5546
reference_id dsa-5546
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:03Z/
url https://www.debian.org/security/2023/dsa-5546
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
reference_id EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
22
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:03Z/
url https://security.gentoo.org/glsa/202311-11
23
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:03Z/
url https://security.gentoo.org/glsa/202312-07
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
reference_id PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:03Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
25
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
reference_id stable-channel-update-for-desktop_31.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:03Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5849
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q432-m3yj-uyee
91
url VCID-qga5-mtb2-8ubc
vulnerability_id VCID-qga5-mtb2-8ubc
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6509
reference_id
reference_type
scores
0
value 0.00927
scoring_system epss
scoring_elements 0.76
published_at 2026-04-02T12:55:00Z
1
value 0.00927
scoring_system epss
scoring_elements 0.76032
published_at 2026-04-04T12:55:00Z
2
value 0.00927
scoring_system epss
scoring_elements 0.76011
published_at 2026-04-07T12:55:00Z
3
value 0.00927
scoring_system epss
scoring_elements 0.76044
published_at 2026-04-08T12:55:00Z
4
value 0.00927
scoring_system epss
scoring_elements 0.76059
published_at 2026-04-09T12:55:00Z
5
value 0.00927
scoring_system epss
scoring_elements 0.76084
published_at 2026-04-11T12:55:00Z
6
value 0.00927
scoring_system epss
scoring_elements 0.7606
published_at 2026-04-12T12:55:00Z
7
value 0.00927
scoring_system epss
scoring_elements 0.76058
published_at 2026-04-13T12:55:00Z
8
value 0.00927
scoring_system epss
scoring_elements 0.76098
published_at 2026-04-16T12:55:00Z
9
value 0.00927
scoring_system epss
scoring_elements 0.76102
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6509
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6509
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qga5-mtb2-8ubc
92
url VCID-qpfk-bgrf-wbhn
vulnerability_id VCID-qpfk-bgrf-wbhn
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6345
reference_id
reference_type
scores
0
value 0.0072
scoring_system epss
scoring_elements 0.72434
published_at 2026-04-02T12:55:00Z
1
value 0.0072
scoring_system epss
scoring_elements 0.72452
published_at 2026-04-04T12:55:00Z
2
value 0.0072
scoring_system epss
scoring_elements 0.72428
published_at 2026-04-07T12:55:00Z
3
value 0.0072
scoring_system epss
scoring_elements 0.72467
published_at 2026-04-08T12:55:00Z
4
value 0.0072
scoring_system epss
scoring_elements 0.7248
published_at 2026-04-09T12:55:00Z
5
value 0.0072
scoring_system epss
scoring_elements 0.72502
published_at 2026-04-11T12:55:00Z
6
value 0.0072
scoring_system epss
scoring_elements 0.72485
published_at 2026-04-12T12:55:00Z
7
value 0.0072
scoring_system epss
scoring_elements 0.72475
published_at 2026-04-13T12:55:00Z
8
value 0.0072
scoring_system epss
scoring_elements 0.72517
published_at 2026-04-16T12:55:00Z
9
value 0.0072
scoring_system epss
scoring_elements 0.72526
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6345
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://crbug.com/1505053
reference_id 1505053
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://crbug.com/1505053
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/
reference_id 6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6T7ABNYMOI4ZHVCSPCNP7HQTOLGF53A2/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/
reference_id C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C7XQNYZZA3X2LBJF57ZHKXWOMJKNLZYR/
10
reference_url https://www.debian.org/security/2023/dsa-5569
reference_id dsa-5569
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://www.debian.org/security/2023/dsa-5569
11
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
12
reference_url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
reference_id stable-channel-update-for-desktop_28.html
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_28.html
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/
reference_id UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2023-12-01T15:59:37Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UJROPNKWW65R34J4IYGTJ7A3OBPUL4IQ/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6345
risk_score 10.0
exploitability 2.0
weighted_severity 8.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qpfk-bgrf-wbhn
93
url VCID-qw37-ryve-kkbz
vulnerability_id VCID-qw37-ryve-kkbz
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5187
reference_id
reference_type
scores
0
value 0.00221
scoring_system epss
scoring_elements 0.44705
published_at 2026-04-02T12:55:00Z
1
value 0.00221
scoring_system epss
scoring_elements 0.44725
published_at 2026-04-04T12:55:00Z
2
value 0.00221
scoring_system epss
scoring_elements 0.44662
published_at 2026-04-07T12:55:00Z
3
value 0.00221
scoring_system epss
scoring_elements 0.44714
published_at 2026-04-08T12:55:00Z
4
value 0.00221
scoring_system epss
scoring_elements 0.44717
published_at 2026-04-09T12:55:00Z
5
value 0.00221
scoring_system epss
scoring_elements 0.44733
published_at 2026-04-11T12:55:00Z
6
value 0.00221
scoring_system epss
scoring_elements 0.44702
published_at 2026-04-13T12:55:00Z
7
value 0.00221
scoring_system epss
scoring_elements 0.44758
published_at 2026-04-16T12:55:00Z
8
value 0.00221
scoring_system epss
scoring_elements 0.4475
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5187
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5186
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5186
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5187
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5217
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5187
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qw37-ryve-kkbz
94
url VCID-qwe8-16t2-cfe2
vulnerability_id VCID-qwe8-16t2-cfe2
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4075
reference_id
reference_type
scores
0
value 0.00593
scoring_system epss
scoring_elements 0.69223
published_at 2026-04-02T12:55:00Z
1
value 0.00593
scoring_system epss
scoring_elements 0.69243
published_at 2026-04-04T12:55:00Z
2
value 0.00593
scoring_system epss
scoring_elements 0.69225
published_at 2026-04-07T12:55:00Z
3
value 0.00593
scoring_system epss
scoring_elements 0.69275
published_at 2026-04-08T12:55:00Z
4
value 0.00593
scoring_system epss
scoring_elements 0.69293
published_at 2026-04-09T12:55:00Z
5
value 0.00593
scoring_system epss
scoring_elements 0.69315
published_at 2026-04-11T12:55:00Z
6
value 0.00593
scoring_system epss
scoring_elements 0.69299
published_at 2026-04-12T12:55:00Z
7
value 0.00593
scoring_system epss
scoring_elements 0.6927
published_at 2026-04-13T12:55:00Z
8
value 0.00593
scoring_system epss
scoring_elements 0.69309
published_at 2026-04-16T12:55:00Z
9
value 0.00593
scoring_system epss
scoring_elements 0.69318
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4075
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4075
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qwe8-16t2-cfe2
95
url VCID-r475-nu6b-kuh9
vulnerability_id VCID-r475-nu6b-kuh9
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4355
reference_id
reference_type
scores
0
value 0.39284
scoring_system epss
scoring_elements 0.97298
published_at 2026-04-18T12:55:00Z
1
value 0.39284
scoring_system epss
scoring_elements 0.9727
published_at 2026-04-02T12:55:00Z
2
value 0.39284
scoring_system epss
scoring_elements 0.97275
published_at 2026-04-04T12:55:00Z
3
value 0.39284
scoring_system epss
scoring_elements 0.97276
published_at 2026-04-07T12:55:00Z
4
value 0.39284
scoring_system epss
scoring_elements 0.97282
published_at 2026-04-08T12:55:00Z
5
value 0.39284
scoring_system epss
scoring_elements 0.97283
published_at 2026-04-09T12:55:00Z
6
value 0.39284
scoring_system epss
scoring_elements 0.97286
published_at 2026-04-11T12:55:00Z
7
value 0.39284
scoring_system epss
scoring_elements 0.97287
published_at 2026-04-12T12:55:00Z
8
value 0.39284
scoring_system epss
scoring_elements 0.97288
published_at 2026-04-13T12:55:00Z
9
value 0.39284
scoring_system epss
scoring_elements 0.97295
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4355
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
22
reference_url https://crbug.com/1468943
reference_id 1468943
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:31Z/
url https://crbug.com/1468943
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
reference_id 2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
24
reference_url http://packetstormsecurity.com/files/174950/Chrome-Dangling-FixedArray-Pointers-Memory-Corruption.html
reference_id Chrome-Dangling-FixedArray-Pointers-Memory-Corruption.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:31Z/
url http://packetstormsecurity.com/files/174950/Chrome-Dangling-FixedArray-Pointers-Memory-Corruption.html
25
reference_url https://www.debian.org/security/2023/dsa-5479
reference_id dsa-5479
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:31Z/
url https://www.debian.org/security/2023/dsa-5479
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
reference_id OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:31Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
27
reference_url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:31Z/
url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4355
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r475-nu6b-kuh9
96
url VCID-r87r-zkcv-afga
vulnerability_id VCID-r87r-zkcv-afga
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5856
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66934
published_at 2026-04-07T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.67001
published_at 2026-04-12T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.67015
published_at 2026-04-11T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.66995
published_at 2026-04-09T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.66982
published_at 2026-04-08T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.66959
published_at 2026-04-04T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.66933
published_at 2026-04-02T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.67017
published_at 2026-04-18T12:55:00Z
8
value 0.00524
scoring_system epss
scoring_elements 0.67003
published_at 2026-04-16T12:55:00Z
9
value 0.00524
scoring_system epss
scoring_elements 0.6697
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5856
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://crbug.com/1493380
reference_id 1493380
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:56Z/
url https://crbug.com/1493380
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
reference_id 2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
20
reference_url https://www.debian.org/security/2023/dsa-5546
reference_id dsa-5546
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:56Z/
url https://www.debian.org/security/2023/dsa-5546
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
reference_id EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
22
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:56Z/
url https://security.gentoo.org/glsa/202311-11
23
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:56Z/
url https://security.gentoo.org/glsa/202312-07
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
reference_id PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:56Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
25
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
reference_id stable-channel-update-for-desktop_31.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:25:56Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5856
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r87r-zkcv-afga
97
url VCID-r8bv-swqh-u7bv
vulnerability_id VCID-r8bv-swqh-u7bv
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2933
reference_id
reference_type
scores
0
value 0.0038
scoring_system epss
scoring_elements 0.59536
published_at 2026-04-11T12:55:00Z
1
value 0.0038
scoring_system epss
scoring_elements 0.59461
published_at 2026-04-02T12:55:00Z
2
value 0.0038
scoring_system epss
scoring_elements 0.59501
published_at 2026-04-13T12:55:00Z
3
value 0.0038
scoring_system epss
scoring_elements 0.59486
published_at 2026-04-04T12:55:00Z
4
value 0.0038
scoring_system epss
scoring_elements 0.59453
published_at 2026-04-07T12:55:00Z
5
value 0.0038
scoring_system epss
scoring_elements 0.59504
published_at 2026-04-08T12:55:00Z
6
value 0.0038
scoring_system epss
scoring_elements 0.59517
published_at 2026-04-09T12:55:00Z
7
value 0.0038
scoring_system epss
scoring_elements 0.5952
published_at 2026-04-12T12:55:00Z
8
value 0.0038
scoring_system epss
scoring_elements 0.59541
published_at 2026-04-18T12:55:00Z
9
value 0.0038
scoring_system epss
scoring_elements 0.59534
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2933
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1445426
reference_id 1445426
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:07Z/
url https://crbug.com/1445426
16
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:07Z/
url https://www.debian.org/security/2023/dsa-5418
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:07Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:07Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2933
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r8bv-swqh-u7bv
98
url VCID-s213-1dng-tuf8
vulnerability_id VCID-s213-1dng-tuf8
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3733
reference_id
reference_type
scores
0
value 0.00183
scoring_system epss
scoring_elements 0.40071
published_at 2026-04-02T12:55:00Z
1
value 0.00183
scoring_system epss
scoring_elements 0.40097
published_at 2026-04-04T12:55:00Z
2
value 0.00183
scoring_system epss
scoring_elements 0.40019
published_at 2026-04-07T12:55:00Z
3
value 0.00183
scoring_system epss
scoring_elements 0.40072
published_at 2026-04-08T12:55:00Z
4
value 0.00183
scoring_system epss
scoring_elements 0.40086
published_at 2026-04-09T12:55:00Z
5
value 0.00183
scoring_system epss
scoring_elements 0.40096
published_at 2026-04-11T12:55:00Z
6
value 0.00183
scoring_system epss
scoring_elements 0.4006
published_at 2026-04-12T12:55:00Z
7
value 0.00183
scoring_system epss
scoring_elements 0.4004
published_at 2026-04-13T12:55:00Z
8
value 0.00183
scoring_system epss
scoring_elements 0.40091
published_at 2026-04-16T12:55:00Z
9
value 0.00183
scoring_system epss
scoring_elements 0.40062
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3733
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3733
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s213-1dng-tuf8
99
url VCID-s2k4-y9cp-efc4
vulnerability_id VCID-s2k4-y9cp-efc4
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4430
reference_id
reference_type
scores
0
value 0.13133
scoring_system epss
scoring_elements 0.94088
published_at 2026-04-02T12:55:00Z
1
value 0.13133
scoring_system epss
scoring_elements 0.94098
published_at 2026-04-04T12:55:00Z
2
value 0.13133
scoring_system epss
scoring_elements 0.94102
published_at 2026-04-07T12:55:00Z
3
value 0.13133
scoring_system epss
scoring_elements 0.94111
published_at 2026-04-08T12:55:00Z
4
value 0.13133
scoring_system epss
scoring_elements 0.94115
published_at 2026-04-09T12:55:00Z
5
value 0.13133
scoring_system epss
scoring_elements 0.9412
published_at 2026-04-13T12:55:00Z
6
value 0.13133
scoring_system epss
scoring_elements 0.94136
published_at 2026-04-16T12:55:00Z
7
value 0.13133
scoring_system epss
scoring_elements 0.94141
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4430
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4428
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4431
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4430
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s2k4-y9cp-efc4
100
url VCID-s3yb-zvku-bka7
vulnerability_id VCID-s3yb-zvku-bka7
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4365
reference_id
reference_type
scores
0
value 0.00345
scoring_system epss
scoring_elements 0.5707
published_at 2026-04-02T12:55:00Z
1
value 0.00345
scoring_system epss
scoring_elements 0.57092
published_at 2026-04-04T12:55:00Z
2
value 0.00345
scoring_system epss
scoring_elements 0.57069
published_at 2026-04-07T12:55:00Z
3
value 0.00345
scoring_system epss
scoring_elements 0.5712
published_at 2026-04-08T12:55:00Z
4
value 0.00345
scoring_system epss
scoring_elements 0.57121
published_at 2026-04-09T12:55:00Z
5
value 0.00345
scoring_system epss
scoring_elements 0.57133
published_at 2026-04-11T12:55:00Z
6
value 0.00345
scoring_system epss
scoring_elements 0.57112
published_at 2026-04-18T12:55:00Z
7
value 0.00345
scoring_system epss
scoring_elements 0.57089
published_at 2026-04-13T12:55:00Z
8
value 0.00345
scoring_system epss
scoring_elements 0.57117
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4365
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4365
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s3yb-zvku-bka7
101
url VCID-sfh6-1fwg-p3af
vulnerability_id VCID-sfh6-1fwg-p3af
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6348
reference_id
reference_type
scores
0
value 0.00605
scoring_system epss
scoring_elements 0.69658
published_at 2026-04-18T12:55:00Z
1
value 0.00605
scoring_system epss
scoring_elements 0.69623
published_at 2026-04-12T12:55:00Z
2
value 0.00605
scoring_system epss
scoring_elements 0.6961
published_at 2026-04-13T12:55:00Z
3
value 0.00605
scoring_system epss
scoring_elements 0.69649
published_at 2026-04-16T12:55:00Z
4
value 0.00605
scoring_system epss
scoring_elements 0.696
published_at 2026-04-08T12:55:00Z
5
value 0.00605
scoring_system epss
scoring_elements 0.69616
published_at 2026-04-09T12:55:00Z
6
value 0.00605
scoring_system epss
scoring_elements 0.69639
published_at 2026-04-11T12:55:00Z
7
value 0.00869
scoring_system epss
scoring_elements 0.75163
published_at 2026-04-04T12:55:00Z
8
value 0.00869
scoring_system epss
scoring_elements 0.7514
published_at 2026-04-07T12:55:00Z
9
value 0.00869
scoring_system epss
scoring_elements 0.75133
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6348
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6345
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6346
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6347
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6348
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6350
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6351
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6348
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sfh6-1fwg-p3af
102
url VCID-spjc-8wsf-2ffz
vulnerability_id VCID-spjc-8wsf-2ffz
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4762
reference_id
reference_type
scores
0
value 0.63587
scoring_system epss
scoring_elements 0.98415
published_at 2026-04-13T12:55:00Z
1
value 0.63587
scoring_system epss
scoring_elements 0.98403
published_at 2026-04-02T12:55:00Z
2
value 0.63587
scoring_system epss
scoring_elements 0.98405
published_at 2026-04-04T12:55:00Z
3
value 0.63587
scoring_system epss
scoring_elements 0.98408
published_at 2026-04-07T12:55:00Z
4
value 0.63587
scoring_system epss
scoring_elements 0.98412
published_at 2026-04-09T12:55:00Z
5
value 0.63587
scoring_system epss
scoring_elements 0.98411
published_at 2026-04-08T12:55:00Z
6
value 0.64635
scoring_system epss
scoring_elements 0.98464
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4762
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4762
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4763
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4764
5
reference_url https://crbug.com/1473247
reference_id 1473247
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T05:00:09Z/
url https://crbug.com/1473247
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
reference_id 27NR3KG553CG6LGPMP6SHWEVHTYPL6RC
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T05:00:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
7
reference_url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4762
reference_id CVE-2023-4762
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T05:00:09Z/
url https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-4762
8
reference_url https://www.debian.org/security/2023/dsa-5491
reference_id dsa-5491
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T05:00:09Z/
url https://www.debian.org/security/2023/dsa-5491
9
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T05:00:09Z/
url https://security.gentoo.org/glsa/202311-11
10
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T05:00:09Z/
url https://security.gentoo.org/glsa/202312-07
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T05:00:09Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
12
reference_url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-06T05:00:09Z/
url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4762
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-spjc-8wsf-2ffz
103
url VCID-t92z-ygnk-qyb2
vulnerability_id VCID-t92z-ygnk-qyb2
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6510
reference_id
reference_type
scores
0
value 0.00927
scoring_system epss
scoring_elements 0.76
published_at 2026-04-02T12:55:00Z
1
value 0.00927
scoring_system epss
scoring_elements 0.76032
published_at 2026-04-04T12:55:00Z
2
value 0.00927
scoring_system epss
scoring_elements 0.76011
published_at 2026-04-07T12:55:00Z
3
value 0.00927
scoring_system epss
scoring_elements 0.76044
published_at 2026-04-08T12:55:00Z
4
value 0.00927
scoring_system epss
scoring_elements 0.76059
published_at 2026-04-09T12:55:00Z
5
value 0.00927
scoring_system epss
scoring_elements 0.76084
published_at 2026-04-11T12:55:00Z
6
value 0.00927
scoring_system epss
scoring_elements 0.7606
published_at 2026-04-12T12:55:00Z
7
value 0.00927
scoring_system epss
scoring_elements 0.76058
published_at 2026-04-13T12:55:00Z
8
value 0.00927
scoring_system epss
scoring_elements 0.76098
published_at 2026-04-16T12:55:00Z
9
value 0.00927
scoring_system epss
scoring_elements 0.76102
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6510
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6509
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6510
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6511
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6512
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3173
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3175
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6510
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t92z-ygnk-qyb2
104
url VCID-t98p-pkdc-yfhu
vulnerability_id VCID-t98p-pkdc-yfhu
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4901
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50619
published_at 2026-04-18T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-08T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50568
published_at 2026-04-09T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.5061
published_at 2026-04-11T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50587
published_at 2026-04-12T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.50572
published_at 2026-04-13T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50614
published_at 2026-04-16T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-02T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50563
published_at 2026-04-04T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50516
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4901
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
14
reference_url https://crbug.com/1459281
reference_id 1459281
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:49:46Z/
url https://crbug.com/1459281
15
reference_url https://www.debian.org/security/2023/dsa-5499
reference_id dsa-5499
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:49:46Z/
url https://www.debian.org/security/2023/dsa-5499
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:49:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
17
reference_url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-21T16:49:46Z/
url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4901
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t98p-pkdc-yfhu
105
url VCID-t9k3-2ttv-f7c4
vulnerability_id VCID-t9k3-2ttv-f7c4
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2941
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28242
published_at 2026-04-02T12:55:00Z
1
value 0.00103
scoring_system epss
scoring_elements 0.28286
published_at 2026-04-04T12:55:00Z
2
value 0.00103
scoring_system epss
scoring_elements 0.28077
published_at 2026-04-07T12:55:00Z
3
value 0.00103
scoring_system epss
scoring_elements 0.28143
published_at 2026-04-08T12:55:00Z
4
value 0.00103
scoring_system epss
scoring_elements 0.28186
published_at 2026-04-09T12:55:00Z
5
value 0.00103
scoring_system epss
scoring_elements 0.28193
published_at 2026-04-11T12:55:00Z
6
value 0.00103
scoring_system epss
scoring_elements 0.28149
published_at 2026-04-12T12:55:00Z
7
value 0.00103
scoring_system epss
scoring_elements 0.28092
published_at 2026-04-13T12:55:00Z
8
value 0.00103
scoring_system epss
scoring_elements 0.28103
published_at 2026-04-16T12:55:00Z
9
value 0.00103
scoring_system epss
scoring_elements 0.28087
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2941
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1430269
reference_id 1430269
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:36Z/
url https://crbug.com/1430269
16
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:36Z/
url https://www.debian.org/security/2023/dsa-5418
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:36Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:36Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2941
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t9k3-2ttv-f7c4
106
url VCID-tgec-emrh-kyd9
vulnerability_id VCID-tgec-emrh-kyd9
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5859
reference_id
reference_type
scores
0
value 0.00668
scoring_system epss
scoring_elements 0.71243
published_at 2026-04-02T12:55:00Z
1
value 0.00668
scoring_system epss
scoring_elements 0.71261
published_at 2026-04-04T12:55:00Z
2
value 0.00668
scoring_system epss
scoring_elements 0.71236
published_at 2026-04-07T12:55:00Z
3
value 0.00668
scoring_system epss
scoring_elements 0.71278
published_at 2026-04-08T12:55:00Z
4
value 0.00668
scoring_system epss
scoring_elements 0.71291
published_at 2026-04-09T12:55:00Z
5
value 0.00668
scoring_system epss
scoring_elements 0.71314
published_at 2026-04-11T12:55:00Z
6
value 0.00668
scoring_system epss
scoring_elements 0.71298
published_at 2026-04-12T12:55:00Z
7
value 0.00668
scoring_system epss
scoring_elements 0.71282
published_at 2026-04-13T12:55:00Z
8
value 0.00668
scoring_system epss
scoring_elements 0.71329
published_at 2026-04-16T12:55:00Z
9
value 0.00668
scoring_system epss
scoring_elements 0.71335
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5859
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
19
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5859
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tgec-emrh-kyd9
107
url VCID-tnt7-2u72-eqbp
vulnerability_id VCID-tnt7-2u72-eqbp
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4764
reference_id
reference_type
scores
0
value 0.00153
scoring_system epss
scoring_elements 0.36156
published_at 2026-04-02T12:55:00Z
1
value 0.00153
scoring_system epss
scoring_elements 0.36187
published_at 2026-04-04T12:55:00Z
2
value 0.00153
scoring_system epss
scoring_elements 0.36022
published_at 2026-04-07T12:55:00Z
3
value 0.00153
scoring_system epss
scoring_elements 0.36072
published_at 2026-04-08T12:55:00Z
4
value 0.00153
scoring_system epss
scoring_elements 0.3609
published_at 2026-04-09T12:55:00Z
5
value 0.00153
scoring_system epss
scoring_elements 0.36097
published_at 2026-04-11T12:55:00Z
6
value 0.00153
scoring_system epss
scoring_elements 0.36058
published_at 2026-04-12T12:55:00Z
7
value 0.00153
scoring_system epss
scoring_elements 0.36032
published_at 2026-04-13T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36073
published_at 2026-04-16T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36059
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4764
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4762
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4763
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4763
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4764
5
reference_url https://crbug.com/1447237
reference_id 1447237
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T20:49:15Z/
url https://crbug.com/1447237
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
reference_id 27NR3KG553CG6LGPMP6SHWEVHTYPL6RC
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T20:49:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/27NR3KG553CG6LGPMP6SHWEVHTYPL6RC/
7
reference_url https://www.debian.org/security/2023/dsa-5491
reference_id dsa-5491
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T20:49:15Z/
url https://www.debian.org/security/2023/dsa-5491
8
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T20:49:15Z/
url https://security.gentoo.org/glsa/202311-11
9
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T20:49:15Z/
url https://security.gentoo.org/glsa/202312-07
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
reference_id KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T20:49:15Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KUQ7CTX3W372X3UY56VVNAHCH6H2F4X3/
11
reference_url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-26T20:49:15Z/
url https://chromereleases.googleblog.com/2023/09/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4764
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tnt7-2u72-eqbp
108
url VCID-trs8-c1n8-aybp
vulnerability_id VCID-trs8-c1n8-aybp
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3738
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33544
published_at 2026-04-02T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33576
published_at 2026-04-04T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33416
published_at 2026-04-07T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.3346
published_at 2026-04-08T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33494
published_at 2026-04-09T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33497
published_at 2026-04-11T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33456
published_at 2026-04-12T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33433
published_at 2026-04-13T12:55:00Z
8
value 0.00137
scoring_system epss
scoring_elements 0.33469
published_at 2026-04-16T12:55:00Z
9
value 0.00137
scoring_system epss
scoring_elements 0.33444
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3738
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3738
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-trs8-c1n8-aybp
109
url VCID-tsgb-1djg-93d9
vulnerability_id VCID-tsgb-1djg-93d9
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3730
reference_id
reference_type
scores
0
value 0.00484
scoring_system epss
scoring_elements 0.65249
published_at 2026-04-02T12:55:00Z
1
value 0.00484
scoring_system epss
scoring_elements 0.65275
published_at 2026-04-04T12:55:00Z
2
value 0.00484
scoring_system epss
scoring_elements 0.65241
published_at 2026-04-07T12:55:00Z
3
value 0.00484
scoring_system epss
scoring_elements 0.6529
published_at 2026-04-08T12:55:00Z
4
value 0.00484
scoring_system epss
scoring_elements 0.65303
published_at 2026-04-09T12:55:00Z
5
value 0.00484
scoring_system epss
scoring_elements 0.65321
published_at 2026-04-11T12:55:00Z
6
value 0.00484
scoring_system epss
scoring_elements 0.65308
published_at 2026-04-12T12:55:00Z
7
value 0.00484
scoring_system epss
scoring_elements 0.65281
published_at 2026-04-13T12:55:00Z
8
value 0.00484
scoring_system epss
scoring_elements 0.65314
published_at 2026-04-16T12:55:00Z
9
value 0.00484
scoring_system epss
scoring_elements 0.65324
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3730
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3727
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3728
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3730
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3732
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3733
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3734
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3735
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3736
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3737
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3738
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3739
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3740
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4860
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3730
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tsgb-1djg-93d9
110
url VCID-u32u-gjv1-fycr
vulnerability_id VCID-u32u-gjv1-fycr
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4350
reference_id
reference_type
scores
0
value 0.00322
scoring_system epss
scoring_elements 0.55243
published_at 2026-04-02T12:55:00Z
1
value 0.00322
scoring_system epss
scoring_elements 0.55266
published_at 2026-04-04T12:55:00Z
2
value 0.00322
scoring_system epss
scoring_elements 0.55245
published_at 2026-04-07T12:55:00Z
3
value 0.00322
scoring_system epss
scoring_elements 0.55295
published_at 2026-04-08T12:55:00Z
4
value 0.00322
scoring_system epss
scoring_elements 0.55296
published_at 2026-04-09T12:55:00Z
5
value 0.00322
scoring_system epss
scoring_elements 0.55307
published_at 2026-04-11T12:55:00Z
6
value 0.00322
scoring_system epss
scoring_elements 0.55287
published_at 2026-04-12T12:55:00Z
7
value 0.00322
scoring_system epss
scoring_elements 0.55268
published_at 2026-04-13T12:55:00Z
8
value 0.00322
scoring_system epss
scoring_elements 0.55306
published_at 2026-04-16T12:55:00Z
9
value 0.00322
scoring_system epss
scoring_elements 0.5531
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4350
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4350
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u32u-gjv1-fycr
111
url VCID-u7k2-pje5-ybfb
vulnerability_id VCID-u7k2-pje5-ybfb
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2929
reference_id
reference_type
scores
0
value 0.006
scoring_system epss
scoring_elements 0.69404
published_at 2026-04-04T12:55:00Z
1
value 0.006
scoring_system epss
scoring_elements 0.69388
published_at 2026-04-02T12:55:00Z
2
value 0.006
scoring_system epss
scoring_elements 0.69491
published_at 2026-04-18T12:55:00Z
3
value 0.006
scoring_system epss
scoring_elements 0.69456
published_at 2026-04-12T12:55:00Z
4
value 0.006
scoring_system epss
scoring_elements 0.69471
published_at 2026-04-11T12:55:00Z
5
value 0.006
scoring_system epss
scoring_elements 0.69449
published_at 2026-04-09T12:55:00Z
6
value 0.006
scoring_system epss
scoring_elements 0.69433
published_at 2026-04-08T12:55:00Z
7
value 0.006
scoring_system epss
scoring_elements 0.69383
published_at 2026-04-07T12:55:00Z
8
value 0.006
scoring_system epss
scoring_elements 0.69481
published_at 2026-04-16T12:55:00Z
9
value 0.006
scoring_system epss
scoring_elements 0.69443
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2929
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1410191
reference_id 1410191
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:14Z/
url https://crbug.com/1410191
16
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LE64KGGOISKPKMYROSDT4K6QFVDIRF6/
reference_id 2LE64KGGOISKPKMYROSDT4K6QFVDIRF6
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2LE64KGGOISKPKMYROSDT4K6QFVDIRF6/
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/
reference_id B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B6SAST6CB5KKCQKH75ER2UQ3ICYPHCIZ/
18
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:14Z/
url https://www.debian.org/security/2023/dsa-5418
19
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:14Z/
url https://security.gentoo.org/glsa/202311-11
20
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:14Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2929
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u7k2-pje5-ybfb
112
url VCID-u7ue-k5y8-hydq
vulnerability_id VCID-u7ue-k5y8-hydq
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4352
reference_id
reference_type
scores
0
value 0.01414
scoring_system epss
scoring_elements 0.80576
published_at 2026-04-18T12:55:00Z
1
value 0.01414
scoring_system epss
scoring_elements 0.80498
published_at 2026-04-02T12:55:00Z
2
value 0.01414
scoring_system epss
scoring_elements 0.8052
published_at 2026-04-04T12:55:00Z
3
value 0.01414
scoring_system epss
scoring_elements 0.80509
published_at 2026-04-07T12:55:00Z
4
value 0.01414
scoring_system epss
scoring_elements 0.80539
published_at 2026-04-08T12:55:00Z
5
value 0.01414
scoring_system epss
scoring_elements 0.80549
published_at 2026-04-09T12:55:00Z
6
value 0.01414
scoring_system epss
scoring_elements 0.80567
published_at 2026-04-11T12:55:00Z
7
value 0.01414
scoring_system epss
scoring_elements 0.80553
published_at 2026-04-12T12:55:00Z
8
value 0.01414
scoring_system epss
scoring_elements 0.80545
published_at 2026-04-13T12:55:00Z
9
value 0.01414
scoring_system epss
scoring_elements 0.80574
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4352
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2312
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4349
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4350
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4351
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4352
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4353
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4354
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4355
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4356
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4357
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4358
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4359
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4360
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4361
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4362
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4363
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4364
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4365
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4366
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4367
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4368
22
reference_url https://crbug.com/1452076
reference_id 1452076
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/
url https://crbug.com/1452076
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
reference_id 2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DMXHPRUGBUDNHZCZCIVMWAUIEXEGMGT/
24
reference_url http://packetstormsecurity.com/files/174669/Chrome-Read-Only-Property-Overwrite.html
reference_id Chrome-Read-Only-Property-Overwrite.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/
url http://packetstormsecurity.com/files/174669/Chrome-Read-Only-Property-Overwrite.html
25
reference_url https://www.debian.org/security/2023/dsa-5479
reference_id dsa-5479
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/
url https://www.debian.org/security/2023/dsa-5479
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
reference_id OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCFEK63FUHFXZH5MSG6TNQOXMQWM4M5S/
27
reference_url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:34Z/
url https://chromereleases.googleblog.com/2023/08/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4352
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u7ue-k5y8-hydq
113
url VCID-un6r-zan7-g3fd
vulnerability_id VCID-un6r-zan7-g3fd
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4070
reference_id
reference_type
scores
0
value 0.00151
scoring_system epss
scoring_elements 0.35868
published_at 2026-04-02T12:55:00Z
1
value 0.00151
scoring_system epss
scoring_elements 0.35898
published_at 2026-04-04T12:55:00Z
2
value 0.00151
scoring_system epss
scoring_elements 0.35729
published_at 2026-04-07T12:55:00Z
3
value 0.00151
scoring_system epss
scoring_elements 0.35779
published_at 2026-04-08T12:55:00Z
4
value 0.00151
scoring_system epss
scoring_elements 0.35801
published_at 2026-04-09T12:55:00Z
5
value 0.00151
scoring_system epss
scoring_elements 0.35809
published_at 2026-04-11T12:55:00Z
6
value 0.00151
scoring_system epss
scoring_elements 0.35767
published_at 2026-04-12T12:55:00Z
7
value 0.00151
scoring_system epss
scoring_elements 0.35744
published_at 2026-04-13T12:55:00Z
8
value 0.00151
scoring_system epss
scoring_elements 0.35784
published_at 2026-04-16T12:55:00Z
9
value 0.00151
scoring_system epss
scoring_elements 0.35772
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4070
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4070
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-un6r-zan7-g3fd
114
url VCID-unpf-19cw-uua4
vulnerability_id VCID-unpf-19cw-uua4
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2940
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.06947
published_at 2026-04-02T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.07001
published_at 2026-04-04T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.06981
published_at 2026-04-07T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.07036
published_at 2026-04-08T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.07067
published_at 2026-04-09T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.07073
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.07062
published_at 2026-04-12T12:55:00Z
7
value 0.00025
scoring_system epss
scoring_elements 0.07053
published_at 2026-04-13T12:55:00Z
8
value 0.00025
scoring_system epss
scoring_elements 0.06993
published_at 2026-04-16T12:55:00Z
9
value 0.00025
scoring_system epss
scoring_elements 0.06978
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2940
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1426807
reference_id 1426807
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:39Z/
url https://crbug.com/1426807
16
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:39Z/
url https://www.debian.org/security/2023/dsa-5418
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:39Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:39Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2940
risk_score 2.2
exploitability 0.5
weighted_severity 4.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unpf-19cw-uua4
115
url VCID-uwc1-hvxz-yyd5
vulnerability_id VCID-uwc1-hvxz-yyd5
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5476
reference_id
reference_type
scores
0
value 0.00791
scoring_system epss
scoring_elements 0.73907
published_at 2026-04-11T12:55:00Z
1
value 0.00791
scoring_system epss
scoring_elements 0.73842
published_at 2026-04-02T12:55:00Z
2
value 0.00791
scoring_system epss
scoring_elements 0.73924
published_at 2026-04-16T12:55:00Z
3
value 0.00791
scoring_system epss
scoring_elements 0.73881
published_at 2026-04-13T12:55:00Z
4
value 0.00791
scoring_system epss
scoring_elements 0.73889
published_at 2026-04-12T12:55:00Z
5
value 0.00791
scoring_system epss
scoring_elements 0.73867
published_at 2026-04-04T12:55:00Z
6
value 0.00791
scoring_system epss
scoring_elements 0.73838
published_at 2026-04-07T12:55:00Z
7
value 0.00791
scoring_system epss
scoring_elements 0.73872
published_at 2026-04-08T12:55:00Z
8
value 0.00791
scoring_system epss
scoring_elements 0.73885
published_at 2026-04-09T12:55:00Z
9
value 0.00791
scoring_system epss
scoring_elements 0.73932
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5476
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://crbug.com/1474253
reference_id 1474253
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/
url https://crbug.com/1474253
16
reference_url https://www.debian.org/security/2023/dsa-5526
reference_id dsa-5526
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/
url https://www.debian.org/security/2023/dsa-5526
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/
url https://security.gentoo.org/glsa/202312-07
19
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
reference_id stable-channel-update-for-desktop_10.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:22Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5476
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uwc1-hvxz-yyd5
116
url VCID-v1zt-yx94-kfhn
vulnerability_id VCID-v1zt-yx94-kfhn
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2938
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36716
published_at 2026-04-02T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36748
published_at 2026-04-04T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36585
published_at 2026-04-07T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36638
published_at 2026-04-08T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36655
published_at 2026-04-09T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36664
published_at 2026-04-11T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36629
published_at 2026-04-12T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36604
published_at 2026-04-13T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36649
published_at 2026-04-16T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36632
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2938
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1416350
reference_id 1416350
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:42Z/
url https://crbug.com/1416350
16
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:42Z/
url https://www.debian.org/security/2023/dsa-5418
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:42Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:42Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2938
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v1zt-yx94-kfhn
117
url VCID-vvhb-55na-d3az
vulnerability_id VCID-vvhb-55na-d3az
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2932
reference_id
reference_type
scores
0
value 0.00366
scoring_system epss
scoring_elements 0.58636
published_at 2026-04-11T12:55:00Z
1
value 0.00366
scoring_system epss
scoring_elements 0.5857
published_at 2026-04-02T12:55:00Z
2
value 0.00366
scoring_system epss
scoring_elements 0.58596
published_at 2026-04-13T12:55:00Z
3
value 0.00366
scoring_system epss
scoring_elements 0.58591
published_at 2026-04-04T12:55:00Z
4
value 0.00366
scoring_system epss
scoring_elements 0.58561
published_at 2026-04-07T12:55:00Z
5
value 0.00366
scoring_system epss
scoring_elements 0.58612
published_at 2026-04-08T12:55:00Z
6
value 0.00366
scoring_system epss
scoring_elements 0.58619
published_at 2026-04-09T12:55:00Z
7
value 0.00366
scoring_system epss
scoring_elements 0.58616
published_at 2026-04-12T12:55:00Z
8
value 0.00366
scoring_system epss
scoring_elements 0.58634
published_at 2026-04-18T12:55:00Z
9
value 0.00366
scoring_system epss
scoring_elements 0.58629
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2932
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1444581
reference_id 1444581
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:09Z/
url https://crbug.com/1444581
16
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:09Z/
url https://www.debian.org/security/2023/dsa-5418
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:09Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:28:09Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2932
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vvhb-55na-d3az
118
url VCID-wf3s-bug7-wfft
vulnerability_id VCID-wf3s-bug7-wfft
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4429
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58776
published_at 2026-04-02T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58797
published_at 2026-04-04T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58766
published_at 2026-04-07T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58818
published_at 2026-04-08T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58825
published_at 2026-04-12T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58843
published_at 2026-04-11T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58805
published_at 2026-04-13T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.58837
published_at 2026-04-16T12:55:00Z
8
value 0.00369
scoring_system epss
scoring_elements 0.58842
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4429
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4428
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4428
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4429
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4430
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4431
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4429
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wf3s-bug7-wfft
119
url VCID-wh6d-ch5b-83h2
vulnerability_id VCID-wh6d-ch5b-83h2
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2937
reference_id
reference_type
scores
0
value 0.00158
scoring_system epss
scoring_elements 0.36716
published_at 2026-04-02T12:55:00Z
1
value 0.00158
scoring_system epss
scoring_elements 0.36748
published_at 2026-04-04T12:55:00Z
2
value 0.00158
scoring_system epss
scoring_elements 0.36585
published_at 2026-04-07T12:55:00Z
3
value 0.00158
scoring_system epss
scoring_elements 0.36638
published_at 2026-04-08T12:55:00Z
4
value 0.00158
scoring_system epss
scoring_elements 0.36655
published_at 2026-04-09T12:55:00Z
5
value 0.00158
scoring_system epss
scoring_elements 0.36664
published_at 2026-04-11T12:55:00Z
6
value 0.00158
scoring_system epss
scoring_elements 0.36629
published_at 2026-04-12T12:55:00Z
7
value 0.00158
scoring_system epss
scoring_elements 0.36604
published_at 2026-04-13T12:55:00Z
8
value 0.00158
scoring_system epss
scoring_elements 0.36649
published_at 2026-04-16T12:55:00Z
9
value 0.00158
scoring_system epss
scoring_elements 0.36632
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2937
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://crbug.com/1413813
reference_id 1413813
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:45Z/
url https://crbug.com/1413813
16
reference_url https://www.debian.org/security/2023/dsa-5418
reference_id dsa-5418
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:45Z/
url https://www.debian.org/security/2023/dsa-5418
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:45Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
reference_id stable-channel-update-for-desktop_30.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-06T15:55:45Z/
url https://chromereleases.googleblog.com/2023/05/stable-channel-update-for-desktop_30.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2937
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wh6d-ch5b-83h2
120
url VCID-wj64-fbxb-37hz
vulnerability_id VCID-wj64-fbxb-37hz
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0225
reference_id
reference_type
scores
0
value 0.00643
scoring_system epss
scoring_elements 0.7067
published_at 2026-04-18T12:55:00Z
1
value 0.00811
scoring_system epss
scoring_elements 0.74266
published_at 2026-04-16T12:55:00Z
2
value 0.00811
scoring_system epss
scoring_elements 0.74185
published_at 2026-04-07T12:55:00Z
3
value 0.00811
scoring_system epss
scoring_elements 0.74213
published_at 2026-04-04T12:55:00Z
4
value 0.00811
scoring_system epss
scoring_elements 0.74218
published_at 2026-04-08T12:55:00Z
5
value 0.00811
scoring_system epss
scoring_elements 0.74233
published_at 2026-04-09T12:55:00Z
6
value 0.00811
scoring_system epss
scoring_elements 0.74254
published_at 2026-04-11T12:55:00Z
7
value 0.00811
scoring_system epss
scoring_elements 0.74236
published_at 2026-04-12T12:55:00Z
8
value 0.00811
scoring_system epss
scoring_elements 0.74229
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0225
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
5
reference_url https://crbug.com/1506923
reference_id 1506923
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:53:43Z/
url https://crbug.com/1506923
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
reference_id AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:53:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
reference_id D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:53:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
9
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:53:43Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2024-0225
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wj64-fbxb-37hz
121
url VCID-wpbx-88g6-fub2
vulnerability_id VCID-wpbx-88g6-fub2
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0224
reference_id
reference_type
scores
0
value 0.00447
scoring_system epss
scoring_elements 0.6356
published_at 2026-04-18T12:55:00Z
1
value 0.00565
scoring_system epss
scoring_elements 0.6838
published_at 2026-04-02T12:55:00Z
2
value 0.00565
scoring_system epss
scoring_elements 0.68399
published_at 2026-04-04T12:55:00Z
3
value 0.00565
scoring_system epss
scoring_elements 0.68375
published_at 2026-04-07T12:55:00Z
4
value 0.00565
scoring_system epss
scoring_elements 0.68426
published_at 2026-04-08T12:55:00Z
5
value 0.00565
scoring_system epss
scoring_elements 0.68443
published_at 2026-04-09T12:55:00Z
6
value 0.00565
scoring_system epss
scoring_elements 0.6847
published_at 2026-04-11T12:55:00Z
7
value 0.00565
scoring_system epss
scoring_elements 0.68457
published_at 2026-04-12T12:55:00Z
8
value 0.00565
scoring_system epss
scoring_elements 0.68425
published_at 2026-04-13T12:55:00Z
9
value 0.00565
scoring_system epss
scoring_elements 0.68463
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0224
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
5
reference_url https://crbug.com/1505086
reference_id 1505086
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:51:02Z/
url https://crbug.com/1505086
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
reference_id AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:51:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
reference_id D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:51:02Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
9
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:51:02Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2024-0224
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpbx-88g6-fub2
122
url VCID-wwvd-s1h2-kfcw
vulnerability_id VCID-wwvd-s1h2-kfcw
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4069
reference_id
reference_type
scores
0
value 0.04207
scoring_system epss
scoring_elements 0.88694
published_at 2026-04-02T12:55:00Z
1
value 0.04207
scoring_system epss
scoring_elements 0.8871
published_at 2026-04-04T12:55:00Z
2
value 0.04207
scoring_system epss
scoring_elements 0.88712
published_at 2026-04-07T12:55:00Z
3
value 0.04207
scoring_system epss
scoring_elements 0.88729
published_at 2026-04-08T12:55:00Z
4
value 0.04207
scoring_system epss
scoring_elements 0.88735
published_at 2026-04-09T12:55:00Z
5
value 0.04207
scoring_system epss
scoring_elements 0.88747
published_at 2026-04-11T12:55:00Z
6
value 0.04207
scoring_system epss
scoring_elements 0.88741
published_at 2026-04-12T12:55:00Z
7
value 0.04207
scoring_system epss
scoring_elements 0.88742
published_at 2026-04-13T12:55:00Z
8
value 0.04207
scoring_system epss
scoring_elements 0.88755
published_at 2026-04-16T12:55:00Z
9
value 0.04207
scoring_system epss
scoring_elements 0.88752
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4069
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4069
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wwvd-s1h2-kfcw
123
url VCID-wzdt-fyru-fkbg
vulnerability_id VCID-wzdt-fyru-fkbg
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5475
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13539
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13601
published_at 2026-04-04T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13398
published_at 2026-04-07T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.1348
published_at 2026-04-08T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13529
published_at 2026-04-09T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13502
published_at 2026-04-11T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13465
published_at 2026-04-12T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13419
published_at 2026-04-13T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13325
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5475
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
16
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5475
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wzdt-fyru-fkbg
124
url VCID-x6kc-jcmb-yka2
vulnerability_id VCID-x6kc-jcmb-yka2
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4908
reference_id
reference_type
scores
0
value 0.00271
scoring_system epss
scoring_elements 0.50535
published_at 2026-04-02T12:55:00Z
1
value 0.00271
scoring_system epss
scoring_elements 0.50563
published_at 2026-04-04T12:55:00Z
2
value 0.00271
scoring_system epss
scoring_elements 0.50516
published_at 2026-04-07T12:55:00Z
3
value 0.00271
scoring_system epss
scoring_elements 0.50571
published_at 2026-04-08T12:55:00Z
4
value 0.00271
scoring_system epss
scoring_elements 0.50568
published_at 2026-04-09T12:55:00Z
5
value 0.00271
scoring_system epss
scoring_elements 0.5061
published_at 2026-04-11T12:55:00Z
6
value 0.00271
scoring_system epss
scoring_elements 0.50587
published_at 2026-04-12T12:55:00Z
7
value 0.00271
scoring_system epss
scoring_elements 0.50572
published_at 2026-04-13T12:55:00Z
8
value 0.00271
scoring_system epss
scoring_elements 0.50614
published_at 2026-04-16T12:55:00Z
9
value 0.00271
scoring_system epss
scoring_elements 0.50619
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4908
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4908
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x6kc-jcmb-yka2
125
url VCID-x8dh-sm6j-n7gd
vulnerability_id VCID-x8dh-sm6j-n7gd
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6705
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.58023
published_at 2026-04-18T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.57966
published_at 2026-04-02T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57985
published_at 2026-04-04T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.57961
published_at 2026-04-07T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58017
published_at 2026-04-08T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58019
published_at 2026-04-09T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.58036
published_at 2026-04-11T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58014
published_at 2026-04-12T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.57994
published_at 2026-04-13T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.58024
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6705
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1505708
reference_id 1505708
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/
url https://crbug.com/1505708
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6705
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8dh-sm6j-n7gd
126
url VCID-xccw-1usp-u3c8
vulnerability_id VCID-xccw-1usp-u3c8
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6704
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40356
published_at 2026-04-18T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40373
published_at 2026-04-02T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40387
published_at 2026-04-09T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40398
published_at 2026-04-11T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.4036
published_at 2026-04-12T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40341
published_at 2026-04-13T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40386
published_at 2026-04-16T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.40399
published_at 2026-04-04T12:55:00Z
8
value 0.00186
scoring_system epss
scoring_elements 0.40324
published_at 2026-04-07T12:55:00Z
9
value 0.00186
scoring_system epss
scoring_elements 0.40375
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6704
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
8
reference_url https://crbug.com/1504792
reference_id 1504792
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T16:55:55Z/
url https://crbug.com/1504792
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T16:55:55Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
10
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
11
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-21T16:55:55Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6704
risk_score 2.2
exploitability 0.5
weighted_severity 4.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xccw-1usp-u3c8
127
url VCID-xcf6-j781-wub5
vulnerability_id VCID-xcf6-j781-wub5
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3421
reference_id
reference_type
scores
0
value 0.00714
scoring_system epss
scoring_elements 0.72343
published_at 2026-04-09T12:55:00Z
1
value 0.00714
scoring_system epss
scoring_elements 0.72297
published_at 2026-04-02T12:55:00Z
2
value 0.00714
scoring_system epss
scoring_elements 0.72388
published_at 2026-04-18T12:55:00Z
3
value 0.00714
scoring_system epss
scoring_elements 0.72379
published_at 2026-04-16T12:55:00Z
4
value 0.00714
scoring_system epss
scoring_elements 0.72337
published_at 2026-04-13T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.7235
published_at 2026-04-12T12:55:00Z
6
value 0.00714
scoring_system epss
scoring_elements 0.72366
published_at 2026-04-11T12:55:00Z
7
value 0.00714
scoring_system epss
scoring_elements 0.72316
published_at 2026-04-04T12:55:00Z
8
value 0.00714
scoring_system epss
scoring_elements 0.72292
published_at 2026-04-07T12:55:00Z
9
value 0.00714
scoring_system epss
scoring_elements 0.72331
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3421
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3421
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3422
4
reference_url https://crbug.com/1447568
reference_id 1447568
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://crbug.com/1447568
5
reference_url https://www.debian.org/security/2023/dsa-5440
reference_id dsa-5440
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://www.debian.org/security/2023/dsa-5440
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/
reference_id KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/
7
reference_url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_26.html
reference_id stable-channel-update-for-desktop_26.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_26.html
8
reference_url https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1751
reference_id TALOS-2023-1751
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1751
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/
reference_id UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3421
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xcf6-j781-wub5
128
url VCID-xdsn-hf85-xqbb
vulnerability_id VCID-xdsn-hf85-xqbb
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5852
reference_id
reference_type
scores
0
value 0.00524
scoring_system epss
scoring_elements 0.66934
published_at 2026-04-07T12:55:00Z
1
value 0.00524
scoring_system epss
scoring_elements 0.67001
published_at 2026-04-12T12:55:00Z
2
value 0.00524
scoring_system epss
scoring_elements 0.67015
published_at 2026-04-11T12:55:00Z
3
value 0.00524
scoring_system epss
scoring_elements 0.66995
published_at 2026-04-09T12:55:00Z
4
value 0.00524
scoring_system epss
scoring_elements 0.66982
published_at 2026-04-08T12:55:00Z
5
value 0.00524
scoring_system epss
scoring_elements 0.66959
published_at 2026-04-04T12:55:00Z
6
value 0.00524
scoring_system epss
scoring_elements 0.66933
published_at 2026-04-02T12:55:00Z
7
value 0.00524
scoring_system epss
scoring_elements 0.67017
published_at 2026-04-18T12:55:00Z
8
value 0.00524
scoring_system epss
scoring_elements 0.67003
published_at 2026-04-16T12:55:00Z
9
value 0.00524
scoring_system epss
scoring_elements 0.6697
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5852
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5482
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5849
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5850
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5852
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5853
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5854
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5855
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5856
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5857
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5858
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5859
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7011
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7013
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7281
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3174
18
reference_url https://crbug.com/1480852
reference_id 1480852
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:00Z/
url https://crbug.com/1480852
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
reference_id 2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2MHLJRFWZNY6BFOW25Q4FEESVWZKS4C2/
20
reference_url https://www.debian.org/security/2023/dsa-5546
reference_id dsa-5546
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:00Z/
url https://www.debian.org/security/2023/dsa-5546
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
reference_id EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EBA4KD5ZSV6XWWFLVR5UBYKKNOYMH33H/
22
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:00Z/
url https://security.gentoo.org/glsa/202311-11
23
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:00Z/
url https://security.gentoo.org/glsa/202312-07
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
reference_id PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PHWLT3M2AQDFD7RNAM3NJMYUC5KHMO5V/
25
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
reference_id stable-channel-update-for-desktop_31.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:00Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_31.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5852
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xdsn-hf85-xqbb
129
url VCID-y2u9-49qt-a3e6
vulnerability_id VCID-y2u9-49qt-a3e6
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6702
reference_id
reference_type
scores
0
value 0.51688
scoring_system epss
scoring_elements 0.97907
published_at 2026-04-18T12:55:00Z
1
value 0.51688
scoring_system epss
scoring_elements 0.97882
published_at 2026-04-02T12:55:00Z
2
value 0.51688
scoring_system epss
scoring_elements 0.97883
published_at 2026-04-04T12:55:00Z
3
value 0.51688
scoring_system epss
scoring_elements 0.97887
published_at 2026-04-07T12:55:00Z
4
value 0.51688
scoring_system epss
scoring_elements 0.97891
published_at 2026-04-08T12:55:00Z
5
value 0.51688
scoring_system epss
scoring_elements 0.97894
published_at 2026-04-09T12:55:00Z
6
value 0.51688
scoring_system epss
scoring_elements 0.97897
published_at 2026-04-11T12:55:00Z
7
value 0.51688
scoring_system epss
scoring_elements 0.97898
published_at 2026-04-12T12:55:00Z
8
value 0.51688
scoring_system epss
scoring_elements 0.97899
published_at 2026-04-13T12:55:00Z
9
value 0.51688
scoring_system epss
scoring_elements 0.97906
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6702
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1501326
reference_id 1501326
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/
url https://crbug.com/1501326
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6702
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y2u9-49qt-a3e6
130
url VCID-y3w7-8syq-s3gv
vulnerability_id VCID-y3w7-8syq-s3gv
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-0223
reference_id
reference_type
scores
0
value 0.09619
scoring_system epss
scoring_elements 0.92899
published_at 2026-04-18T12:55:00Z
1
value 0.09619
scoring_system epss
scoring_elements 0.92869
published_at 2026-04-02T12:55:00Z
2
value 0.09619
scoring_system epss
scoring_elements 0.92872
published_at 2026-04-04T12:55:00Z
3
value 0.09619
scoring_system epss
scoring_elements 0.9287
published_at 2026-04-07T12:55:00Z
4
value 0.09619
scoring_system epss
scoring_elements 0.92878
published_at 2026-04-08T12:55:00Z
5
value 0.09619
scoring_system epss
scoring_elements 0.92883
published_at 2026-04-09T12:55:00Z
6
value 0.09619
scoring_system epss
scoring_elements 0.92888
published_at 2026-04-11T12:55:00Z
7
value 0.09619
scoring_system epss
scoring_elements 0.92886
published_at 2026-04-12T12:55:00Z
8
value 0.09619
scoring_system epss
scoring_elements 0.92887
published_at 2026-04-13T12:55:00Z
9
value 0.09619
scoring_system epss
scoring_elements 0.92897
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-0223
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0223
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0224
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0225
5
reference_url https://crbug.com/1505009
reference_id 1505009
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:48:46Z/
url https://crbug.com/1505009
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
reference_id AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:48:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
7
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
reference_id D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:48:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
8
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
9
reference_url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-01-04T16:48:46Z/
url https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2024-0223
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y3w7-8syq-s3gv
131
url VCID-y8yu-rkjs-h7es
vulnerability_id VCID-y8yu-rkjs-h7es
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3420
reference_id
reference_type
scores
0
value 0.03957
scoring_system epss
scoring_elements 0.88333
published_at 2026-04-07T12:55:00Z
1
value 0.03957
scoring_system epss
scoring_elements 0.88314
published_at 2026-04-02T12:55:00Z
2
value 0.03957
scoring_system epss
scoring_elements 0.88361
published_at 2026-04-13T12:55:00Z
3
value 0.03957
scoring_system epss
scoring_elements 0.88369
published_at 2026-04-11T12:55:00Z
4
value 0.03957
scoring_system epss
scoring_elements 0.88358
published_at 2026-04-09T12:55:00Z
5
value 0.03957
scoring_system epss
scoring_elements 0.88352
published_at 2026-04-08T12:55:00Z
6
value 0.03957
scoring_system epss
scoring_elements 0.88328
published_at 2026-04-04T12:55:00Z
7
value 0.03957
scoring_system epss
scoring_elements 0.88372
published_at 2026-04-18T12:55:00Z
8
value 0.03957
scoring_system epss
scoring_elements 0.88375
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3420
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3421
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3422
4
reference_url https://crbug.com/1452137
reference_id 1452137
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://crbug.com/1452137
5
reference_url https://www.debian.org/security/2023/dsa-5440
reference_id dsa-5440
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://www.debian.org/security/2023/dsa-5440
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/
reference_id KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/
7
reference_url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_26.html
reference_id stable-channel-update-for-desktop_26.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_26.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/
reference_id UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3420
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y8yu-rkjs-h7es
132
url VCID-y95a-y846-3feb
vulnerability_id VCID-y95a-y846-3feb
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5485
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.16963
published_at 2026-04-02T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.17019
published_at 2026-04-04T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.16801
published_at 2026-04-07T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.1689
published_at 2026-04-08T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16948
published_at 2026-04-09T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16922
published_at 2026-04-11T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16876
published_at 2026-04-12T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16818
published_at 2026-04-13T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16752
published_at 2026-04-16T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16758
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5485
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5218
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5473
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5474
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5475
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5476
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5477
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5478
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5479
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5481
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5483
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5484
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5485
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5486
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5487
15
reference_url https://crbug.com/1395164
reference_id 1395164
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:54:09Z/
url https://crbug.com/1395164
16
reference_url https://www.debian.org/security/2023/dsa-5526
reference_id dsa-5526
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:54:09Z/
url https://www.debian.org/security/2023/dsa-5526
17
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:54:09Z/
url https://security.gentoo.org/glsa/202311-11
18
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:54:09Z/
url https://security.gentoo.org/glsa/202312-07
19
reference_url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
reference_id stable-channel-update-for-desktop_10.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T16:54:09Z/
url https://chromereleases.googleblog.com/2023/10/stable-channel-update-for-desktop_10.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5485
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y95a-y846-3feb
133
url VCID-ypjx-fn18-9kba
vulnerability_id VCID-ypjx-fn18-9kba
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6707
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.66351
published_at 2026-04-18T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66268
published_at 2026-04-02T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.66294
published_at 2026-04-04T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.66264
published_at 2026-04-07T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66311
published_at 2026-04-08T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.66324
published_at 2026-04-09T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.66344
published_at 2026-04-11T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66332
published_at 2026-04-12T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.66301
published_at 2026-04-13T12:55:00Z
9
value 0.00508
scoring_system epss
scoring_elements 0.66336
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6707
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1504036
reference_id 1504036
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:28Z/
url https://crbug.com/1504036
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:28Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:28Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-6707
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ypjx-fn18-9kba
134
url VCID-ypxd-zqsu-1fda
vulnerability_id VCID-ypxd-zqsu-1fda
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3217
reference_id
reference_type
scores
0
value 0.16587
scoring_system epss
scoring_elements 0.94893
published_at 2026-04-02T12:55:00Z
1
value 0.16587
scoring_system epss
scoring_elements 0.94908
published_at 2026-04-08T12:55:00Z
2
value 0.16587
scoring_system epss
scoring_elements 0.94898
published_at 2026-04-07T12:55:00Z
3
value 0.16587
scoring_system epss
scoring_elements 0.94896
published_at 2026-04-04T12:55:00Z
4
value 0.17457
scoring_system epss
scoring_elements 0.95088
published_at 2026-04-18T12:55:00Z
5
value 0.17457
scoring_system epss
scoring_elements 0.95067
published_at 2026-04-09T12:55:00Z
6
value 0.17457
scoring_system epss
scoring_elements 0.95072
published_at 2026-04-11T12:55:00Z
7
value 0.17457
scoring_system epss
scoring_elements 0.95073
published_at 2026-04-12T12:55:00Z
8
value 0.17457
scoring_system epss
scoring_elements 0.95076
published_at 2026-04-13T12:55:00Z
9
value 0.17457
scoring_system epss
scoring_elements 0.95085
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3217
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3215
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3216
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3217
5
reference_url https://crbug.com/1450601
reference_id 1450601
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:45Z/
url https://crbug.com/1450601
6
reference_url http://packetstormsecurity.com/files/173495/Chrome-device-OpenXrApiWrapper-InitSession-Heap-Use-After-Free.html
reference_id Chrome-device-OpenXrApiWrapper-InitSession-Heap-Use-After-Free.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:45Z/
url http://packetstormsecurity.com/files/173495/Chrome-device-OpenXrApiWrapper-InitSession-Heap-Use-After-Free.html
7
reference_url https://www.debian.org/security/2023/dsa-5428
reference_id dsa-5428
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:45Z/
url https://www.debian.org/security/2023/dsa-5428
8
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:45Z/
url https://security.gentoo.org/glsa/202311-11
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/
reference_id JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/
reference_id O362DC3ZCFRXVHOXMPIL73YOWABQEUYD
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:45Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/
11
reference_url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
reference_id stable-channel-update-for-desktop_13.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:45Z/
url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3217
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ypxd-zqsu-1fda
135
url VCID-yvrc-rgmg-xkf5
vulnerability_id VCID-yvrc-rgmg-xkf5
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3422
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40721
published_at 2026-04-18T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.4074
published_at 2026-04-09T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40758
published_at 2026-04-11T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40723
published_at 2026-04-12T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40704
published_at 2026-04-13T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.4075
published_at 2026-04-16T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40733
published_at 2026-04-02T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40761
published_at 2026-04-04T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40684
published_at 2026-04-07T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40734
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3422
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3420
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3420
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3421
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3422
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3422
4
reference_url https://crbug.com/1450397
reference_id 1450397
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:12:24Z/
url https://crbug.com/1450397
5
reference_url https://www.debian.org/security/2023/dsa-5440
reference_id dsa-5440
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:12:24Z/
url https://www.debian.org/security/2023/dsa-5440
6
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/
reference_id KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:12:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KREKCQTJDVI2AEBG5ECZPSOQXIC2L5XL/
7
reference_url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_26.html
reference_id stable-channel-update-for-desktop_26.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:12:24Z/
url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_26.html
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/
reference_id UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T20:12:24Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBAHED5YFJPRGSEKNZIYHZBGSVHGEHOH/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3422
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yvrc-rgmg-xkf5
136
url VCID-yyx1-1qsd-j3an
vulnerability_id VCID-yyx1-1qsd-j3an
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4078
reference_id
reference_type
scores
0
value 0.00156
scoring_system epss
scoring_elements 0.36529
published_at 2026-04-02T12:55:00Z
1
value 0.00156
scoring_system epss
scoring_elements 0.36563
published_at 2026-04-04T12:55:00Z
2
value 0.00156
scoring_system epss
scoring_elements 0.364
published_at 2026-04-07T12:55:00Z
3
value 0.00156
scoring_system epss
scoring_elements 0.36451
published_at 2026-04-08T12:55:00Z
4
value 0.00156
scoring_system epss
scoring_elements 0.36472
published_at 2026-04-09T12:55:00Z
5
value 0.00156
scoring_system epss
scoring_elements 0.3648
published_at 2026-04-11T12:55:00Z
6
value 0.00156
scoring_system epss
scoring_elements 0.36444
published_at 2026-04-12T12:55:00Z
7
value 0.00156
scoring_system epss
scoring_elements 0.36423
published_at 2026-04-13T12:55:00Z
8
value 0.00156
scoring_system epss
scoring_elements 0.36463
published_at 2026-04-16T12:55:00Z
9
value 0.00156
scoring_system epss
scoring_elements 0.36447
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4078
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4068
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4069
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4070
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4071
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4072
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4073
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4074
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4075
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4076
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4077
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4078
12
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
13
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
url https://security.gentoo.org/glsa/202312-07
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4078
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yyx1-1qsd-j3an
137
url VCID-z455-9yxn-q7f8
vulnerability_id VCID-z455-9yxn-q7f8
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-4904
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20987
published_at 2026-04-02T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21045
published_at 2026-04-04T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20759
published_at 2026-04-07T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20838
published_at 2026-04-08T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.209
published_at 2026-04-09T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20915
published_at 2026-04-11T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20871
published_at 2026-04-12T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20819
published_at 2026-04-13T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.2081
published_at 2026-04-16T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.20802
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-4904
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4900
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4901
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4902
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4903
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4904
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4905
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4906
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4907
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4908
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4909
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7010
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7012
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3176
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-4904
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z455-9yxn-q7f8
138
url VCID-z68g-5ujb-93f5
vulnerability_id VCID-z68g-5ujb-93f5
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-3216
reference_id
reference_type
scores
0
value 0.00866
scoring_system epss
scoring_elements 0.75114
published_at 2026-04-04T12:55:00Z
1
value 0.00866
scoring_system epss
scoring_elements 0.75084
published_at 2026-04-02T12:55:00Z
2
value 0.00866
scoring_system epss
scoring_elements 0.75125
published_at 2026-04-08T12:55:00Z
3
value 0.00866
scoring_system epss
scoring_elements 0.7509
published_at 2026-04-07T12:55:00Z
4
value 0.00924
scoring_system epss
scoring_elements 0.76028
published_at 2026-04-11T12:55:00Z
5
value 0.00924
scoring_system epss
scoring_elements 0.7604
published_at 2026-04-18T12:55:00Z
6
value 0.00924
scoring_system epss
scoring_elements 0.76003
published_at 2026-04-09T12:55:00Z
7
value 0.00924
scoring_system epss
scoring_elements 0.76037
published_at 2026-04-16T12:55:00Z
8
value 0.00924
scoring_system epss
scoring_elements 0.75998
published_at 2026-04-13T12:55:00Z
9
value 0.00924
scoring_system epss
scoring_elements 0.76004
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-3216
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3215
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3216
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3217
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3217
5
reference_url https://crbug.com/1450114
reference_id 1450114
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:47Z/
url https://crbug.com/1450114
6
reference_url https://www.debian.org/security/2023/dsa-5428
reference_id dsa-5428
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:47Z/
url https://www.debian.org/security/2023/dsa-5428
7
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:47Z/
url https://security.gentoo.org/glsa/202311-11
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/
reference_id JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JEH75UOM7FAXDUPC37YHP7ONL2HSDIJR/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/
reference_id O362DC3ZCFRXVHOXMPIL73YOWABQEUYD
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:47Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/O362DC3ZCFRXVHOXMPIL73YOWABQEUYD/
10
reference_url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
reference_id stable-channel-update-for-desktop_13.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:47Z/
url https://chromereleases.googleblog.com/2023/06/stable-channel-update-for-desktop_13.html
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-3216
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z68g-5ujb-93f5
139
url VCID-zdxx-gvsz-9fca
vulnerability_id VCID-zdxx-gvsz-9fca
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-5997
reference_id
reference_type
scores
0
value 0.00403
scoring_system epss
scoring_elements 0.60819
published_at 2026-04-02T12:55:00Z
1
value 0.00403
scoring_system epss
scoring_elements 0.60847
published_at 2026-04-04T12:55:00Z
2
value 0.00403
scoring_system epss
scoring_elements 0.60811
published_at 2026-04-07T12:55:00Z
3
value 0.00403
scoring_system epss
scoring_elements 0.6086
published_at 2026-04-08T12:55:00Z
4
value 0.00403
scoring_system epss
scoring_elements 0.60876
published_at 2026-04-09T12:55:00Z
5
value 0.00403
scoring_system epss
scoring_elements 0.60898
published_at 2026-04-11T12:55:00Z
6
value 0.00403
scoring_system epss
scoring_elements 0.60884
published_at 2026-04-12T12:55:00Z
7
value 0.00403
scoring_system epss
scoring_elements 0.60865
published_at 2026-04-13T12:55:00Z
8
value 0.00403
scoring_system epss
scoring_elements 0.60907
published_at 2026-04-16T12:55:00Z
9
value 0.00403
scoring_system epss
scoring_elements 0.60912
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-5997
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5997
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6112
3
reference_url https://crbug.com/1497997
reference_id 1497997
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://crbug.com/1497997
4
reference_url https://www.debian.org/security/2023/dsa-5556
reference_id dsa-5556
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://www.debian.org/security/2023/dsa-5556
5
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://security.gentoo.org/glsa/202311-11
6
reference_url https://security.gentoo.org/glsa/202312-07
reference_id GLSA-202312-07
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://security.gentoo.org/glsa/202312-07
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/
reference_id JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JHUI5HW7QXT3U74MJMTLUMF5REDO5HD5/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/
reference_id MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN3JQGEC4EFQP3WTI33YBD3CLC3I7P4X/
10
reference_url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://chromereleases.googleblog.com/2023/11/stable-channel-update-for-desktop_14.html
11
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/
reference_id XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-11-22T05:00:14Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWHRLW3GDNFBFSBHDD4QOPUPX7ORTUEC/
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-5997
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zdxx-gvsz-9fca
140
url VCID-zxbk-wxup-ebfy
vulnerability_id VCID-zxbk-wxup-ebfy
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-2935
reference_id
reference_type
scores
0
value 0.09401
scoring_system epss
scoring_elements 0.92767
published_at 2026-04-02T12:55:00Z
1
value 0.09401
scoring_system epss
scoring_elements 0.92772
published_at 2026-04-04T12:55:00Z
2
value 0.09401
scoring_system epss
scoring_elements 0.92769
published_at 2026-04-07T12:55:00Z
3
value 0.09401
scoring_system epss
scoring_elements 0.92779
published_at 2026-04-08T12:55:00Z
4
value 0.09401
scoring_system epss
scoring_elements 0.92783
published_at 2026-04-09T12:55:00Z
5
value 0.09401
scoring_system epss
scoring_elements 0.92789
published_at 2026-04-11T12:55:00Z
6
value 0.09401
scoring_system epss
scoring_elements 0.92787
published_at 2026-04-12T12:55:00Z
7
value 0.09401
scoring_system epss
scoring_elements 0.92788
published_at 2026-04-13T12:55:00Z
8
value 0.09401
scoring_system epss
scoring_elements 0.92798
published_at 2026-04-16T12:55:00Z
9
value 0.09401
scoring_system epss
scoring_elements 0.92799
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-2935
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2929
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2930
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2931
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2934
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2935
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2936
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2937
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2938
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2939
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2940
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2941
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3598
15
reference_url https://security.gentoo.org/glsa/202311-11
reference_id GLSA-202311-11
reference_type
scores
url https://security.gentoo.org/glsa/202311-11
fixed_packages
0
url pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
purl pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.2210.133
1
url pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
purl pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109
aliases CVE-2023-2935
risk_score 0.1
exploitability 0.5
weighted_severity 0.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zxbk-wxup-ebfy
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/microsoft-edge@120.0.6099.109