Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Nameqt6-qtwebengine
Version6.7.2-r6
Qualifiers
arch aarch64
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.8.2-r3
Latest_non_vulnerable_version6.10.1-r14
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-38qj-nt3w-ubcn
vulnerability_id VCID-38qj-nt3w-ubcn
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10231
reference_id
reference_type
scores
0
value 0.00314
scoring_system epss
scoring_elements 0.54558
published_at 2026-04-13T12:55:00Z
1
value 0.00314
scoring_system epss
scoring_elements 0.54591
published_at 2026-04-08T12:55:00Z
2
value 0.00314
scoring_system epss
scoring_elements 0.54585
published_at 2026-04-09T12:55:00Z
3
value 0.00314
scoring_system epss
scoring_elements 0.54597
published_at 2026-04-11T12:55:00Z
4
value 0.00314
scoring_system epss
scoring_elements 0.54579
published_at 2026-04-12T12:55:00Z
5
value 0.00314
scoring_system epss
scoring_elements 0.54546
published_at 2026-04-02T12:55:00Z
6
value 0.00314
scoring_system epss
scoring_elements 0.5457
published_at 2026-04-04T12:55:00Z
7
value 0.00314
scoring_system epss
scoring_elements 0.54539
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10231
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10231
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10231
2
reference_url https://issues.chromium.org/issues/372269618
reference_id 372269618
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-23T14:26:07Z/
url https://issues.chromium.org/issues/372269618
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html
reference_id stable-channel-update-for-desktop_22.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-23T14:26:07Z/
url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-10231
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-38qj-nt3w-ubcn
1
url VCID-7b1v-cp5z-zffj
vulnerability_id VCID-7b1v-cp5z-zffj
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10230
reference_id
reference_type
scores
0
value 0.00253
scoring_system epss
scoring_elements 0.48632
published_at 2026-04-13T12:55:00Z
1
value 0.00253
scoring_system epss
scoring_elements 0.48633
published_at 2026-04-08T12:55:00Z
2
value 0.00253
scoring_system epss
scoring_elements 0.48629
published_at 2026-04-09T12:55:00Z
3
value 0.00253
scoring_system epss
scoring_elements 0.48646
published_at 2026-04-11T12:55:00Z
4
value 0.00253
scoring_system epss
scoring_elements 0.4862
published_at 2026-04-12T12:55:00Z
5
value 0.00253
scoring_system epss
scoring_elements 0.48604
published_at 2026-04-02T12:55:00Z
6
value 0.00253
scoring_system epss
scoring_elements 0.48627
published_at 2026-04-04T12:55:00Z
7
value 0.00253
scoring_system epss
scoring_elements 0.48579
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10230
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10230
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10230
2
reference_url https://issues.chromium.org/issues/371565065
reference_id 371565065
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-23T14:28:20Z/
url https://issues.chromium.org/issues/371565065
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html
reference_id stable-channel-update-for-desktop_22.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-23T14:28:20Z/
url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-10230
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7b1v-cp5z-zffj
2
url VCID-9rar-cdb7-zfcu
vulnerability_id VCID-9rar-cdb7-zfcu
summary Insufficient data validation in DevTools in Google Chrome on Windows prior to 130.0.6723.58 allowed a remote attacker who convinced a user to engage in specific UI gestures to execute arbitrary code via a crafted HTML page. (Chromium security severity: Low)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9965
reference_id
reference_type
scores
0
value 0.00934
scoring_system epss
scoring_elements 0.76143
published_at 2026-04-13T12:55:00Z
1
value 0.00934
scoring_system epss
scoring_elements 0.76131
published_at 2026-04-08T12:55:00Z
2
value 0.00934
scoring_system epss
scoring_elements 0.76144
published_at 2026-04-09T12:55:00Z
3
value 0.00934
scoring_system epss
scoring_elements 0.7617
published_at 2026-04-11T12:55:00Z
4
value 0.00934
scoring_system epss
scoring_elements 0.76146
published_at 2026-04-12T12:55:00Z
5
value 0.00934
scoring_system epss
scoring_elements 0.76087
published_at 2026-04-02T12:55:00Z
6
value 0.00934
scoring_system epss
scoring_elements 0.76119
published_at 2026-04-04T12:55:00Z
7
value 0.00934
scoring_system epss
scoring_elements 0.76098
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9965
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9965
2
reference_url https://issues.chromium.org/issues/352651673
reference_id 352651673
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-25T18:32:02Z/
url https://issues.chromium.org/issues/352651673
3
reference_url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-25T18:32:02Z/
url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-9965
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9rar-cdb7-zfcu
3
url VCID-d26t-ex9d-x3ev
vulnerability_id VCID-d26t-ex9d-x3ev
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45491.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45491.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45491
reference_id
reference_type
scores
0
value 0.00596
scoring_system epss
scoring_elements 0.69351
published_at 2026-04-13T12:55:00Z
1
value 0.00596
scoring_system epss
scoring_elements 0.69291
published_at 2026-04-07T12:55:00Z
2
value 0.00596
scoring_system epss
scoring_elements 0.69341
published_at 2026-04-08T12:55:00Z
3
value 0.00596
scoring_system epss
scoring_elements 0.69358
published_at 2026-04-09T12:55:00Z
4
value 0.00596
scoring_system epss
scoring_elements 0.6938
published_at 2026-04-11T12:55:00Z
5
value 0.00596
scoring_system epss
scoring_elements 0.69364
published_at 2026-04-12T12:55:00Z
6
value 0.00596
scoring_system epss
scoring_elements 0.69293
published_at 2026-04-02T12:55:00Z
7
value 0.00596
scoring_system epss
scoring_elements 0.69311
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45491
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45491
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080150
reference_id 1080150
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080150
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2308616
reference_id 2308616
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2308616
6
reference_url https://github.com/libexpat/libexpat/issues/888
reference_id 888
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-30T13:53:48Z/
url https://github.com/libexpat/libexpat/issues/888
7
reference_url https://github.com/libexpat/libexpat/pull/891
reference_id 891
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-30T13:53:48Z/
url https://github.com/libexpat/libexpat/pull/891
8
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
9
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
10
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
11
reference_url https://access.redhat.com/errata/RHSA-2024:6754
reference_id RHSA-2024:6754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6754
12
reference_url https://access.redhat.com/errata/RHSA-2024:6989
reference_id RHSA-2024:6989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6989
13
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
14
reference_url https://access.redhat.com/errata/RHSA-2024:7599
reference_id RHSA-2024:7599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7599
15
reference_url https://access.redhat.com/errata/RHSA-2024:8859
reference_id RHSA-2024:8859
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8859
16
reference_url https://access.redhat.com/errata/RHSA-2024:9610
reference_id RHSA-2024:9610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9610
17
reference_url https://usn.ubuntu.com/7000-1/
reference_id USN-7000-1
reference_type
scores
url https://usn.ubuntu.com/7000-1/
18
reference_url https://usn.ubuntu.com/7000-2/
reference_id USN-7000-2
reference_type
scores
url https://usn.ubuntu.com/7000-2/
19
reference_url https://usn.ubuntu.com/7001-1/
reference_id USN-7001-1
reference_type
scores
url https://usn.ubuntu.com/7001-1/
20
reference_url https://usn.ubuntu.com/7001-2/
reference_id USN-7001-2
reference_type
scores
url https://usn.ubuntu.com/7001-2/
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-45491
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-d26t-ex9d-x3ev
4
url VCID-e8cj-guq1-2uar
vulnerability_id VCID-e8cj-guq1-2uar
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9123
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39788
published_at 2026-04-13T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39817
published_at 2026-04-08T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39831
published_at 2026-04-09T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.3984
published_at 2026-04-11T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39805
published_at 2026-04-12T12:55:00Z
5
value 0.00181
scoring_system epss
scoring_elements 0.39818
published_at 2026-04-02T12:55:00Z
6
value 0.00181
scoring_system epss
scoring_elements 0.39842
published_at 2026-04-04T12:55:00Z
7
value 0.00181
scoring_system epss
scoring_elements 0.39762
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9123
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9123
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9123
2
reference_url https://issues.chromium.org/issues/365884464
reference_id 365884464
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T03:55:49Z/
url https://issues.chromium.org/issues/365884464
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_24.html
reference_id stable-channel-update-for-desktop_24.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-26T03:55:49Z/
url https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_24.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-9123
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e8cj-guq1-2uar
5
url VCID-gtcn-kyd2-xqdk
vulnerability_id VCID-gtcn-kyd2-xqdk
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45490.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45490.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45490
reference_id
reference_type
scores
0
value 0.00526
scoring_system epss
scoring_elements 0.67016
published_at 2026-04-13T12:55:00Z
1
value 0.00526
scoring_system epss
scoring_elements 0.6698
published_at 2026-04-07T12:55:00Z
2
value 0.00526
scoring_system epss
scoring_elements 0.6703
published_at 2026-04-08T12:55:00Z
3
value 0.00526
scoring_system epss
scoring_elements 0.67042
published_at 2026-04-09T12:55:00Z
4
value 0.00526
scoring_system epss
scoring_elements 0.67062
published_at 2026-04-11T12:55:00Z
5
value 0.00526
scoring_system epss
scoring_elements 0.67048
published_at 2026-04-12T12:55:00Z
6
value 0.00526
scoring_system epss
scoring_elements 0.66982
published_at 2026-04-02T12:55:00Z
7
value 0.00526
scoring_system epss
scoring_elements 0.67006
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45490
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45490
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080149
reference_id 1080149
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080149
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2308615
reference_id 2308615
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2308615
6
reference_url https://github.com/libexpat/libexpat/issues/887
reference_id 887
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-30T18:17:03Z/
url https://github.com/libexpat/libexpat/issues/887
7
reference_url https://github.com/libexpat/libexpat/pull/890
reference_id 890
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-08-30T18:17:03Z/
url https://github.com/libexpat/libexpat/pull/890
8
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
9
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
10
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
11
reference_url https://access.redhat.com/errata/RHSA-2024:6754
reference_id RHSA-2024:6754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6754
12
reference_url https://access.redhat.com/errata/RHSA-2024:6989
reference_id RHSA-2024:6989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6989
13
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
14
reference_url https://access.redhat.com/errata/RHSA-2024:7599
reference_id RHSA-2024:7599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7599
15
reference_url https://access.redhat.com/errata/RHSA-2024:9610
reference_id RHSA-2024:9610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9610
16
reference_url https://access.redhat.com/errata/RHSA-2025:3453
reference_id RHSA-2025:3453
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3453
17
reference_url https://usn.ubuntu.com/7000-1/
reference_id USN-7000-1
reference_type
scores
url https://usn.ubuntu.com/7000-1/
18
reference_url https://usn.ubuntu.com/7000-2/
reference_id USN-7000-2
reference_type
scores
url https://usn.ubuntu.com/7000-2/
19
reference_url https://usn.ubuntu.com/7001-1/
reference_id USN-7001-1
reference_type
scores
url https://usn.ubuntu.com/7001-1/
20
reference_url https://usn.ubuntu.com/7001-2/
reference_id USN-7001-2
reference_type
scores
url https://usn.ubuntu.com/7001-2/
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-45490
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gtcn-kyd2-xqdk
6
url VCID-mmtm-79qv-y3f9
vulnerability_id VCID-mmtm-79qv-y3f9
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9122
reference_id
reference_type
scores
0
value 0.08189
scoring_system epss
scoring_elements 0.922
published_at 2026-04-13T12:55:00Z
1
value 0.08189
scoring_system epss
scoring_elements 0.92183
published_at 2026-04-07T12:55:00Z
2
value 0.08189
scoring_system epss
scoring_elements 0.92194
published_at 2026-04-08T12:55:00Z
3
value 0.08189
scoring_system epss
scoring_elements 0.92198
published_at 2026-04-09T12:55:00Z
4
value 0.08189
scoring_system epss
scoring_elements 0.92203
published_at 2026-04-12T12:55:00Z
5
value 0.08189
scoring_system epss
scoring_elements 0.92174
published_at 2026-04-02T12:55:00Z
6
value 0.08189
scoring_system epss
scoring_elements 0.9218
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9122
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9122
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9122
2
reference_url https://issues.chromium.org/issues/365802567
reference_id 365802567
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T16:24:14Z/
url https://issues.chromium.org/issues/365802567
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_24.html
reference_id stable-channel-update-for-desktop_24.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T16:24:14Z/
url https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_24.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-9122
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mmtm-79qv-y3f9
7
url VCID-nmue-gwtf-vyc4
vulnerability_id VCID-nmue-gwtf-vyc4
summary Insufficient data validation in Mojo in Google Chrome prior to 129.0.6668.89 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9369
reference_id
reference_type
scores
0
value 0.00119
scoring_system epss
scoring_elements 0.30749
published_at 2026-04-13T12:55:00Z
1
value 0.00119
scoring_system epss
scoring_elements 0.30805
published_at 2026-04-08T12:55:00Z
2
value 0.00119
scoring_system epss
scoring_elements 0.30837
published_at 2026-04-09T12:55:00Z
3
value 0.00119
scoring_system epss
scoring_elements 0.30838
published_at 2026-04-11T12:55:00Z
4
value 0.00119
scoring_system epss
scoring_elements 0.30794
published_at 2026-04-12T12:55:00Z
5
value 0.00119
scoring_system epss
scoring_elements 0.30879
published_at 2026-04-02T12:55:00Z
6
value 0.00119
scoring_system epss
scoring_elements 0.30927
published_at 2026-04-04T12:55:00Z
7
value 0.00119
scoring_system epss
scoring_elements 0.30747
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9369
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9369
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9369
2
reference_url https://issues.chromium.org/issues/368208152
reference_id 368208152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T18:42:50Z/
url https://issues.chromium.org/issues/368208152
3
reference_url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-27T18:42:50Z/
url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-9369
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmue-gwtf-vyc4
8
url VCID-nw3z-nwyg-87e5
vulnerability_id VCID-nw3z-nwyg-87e5
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45492.json
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-45492.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-45492
reference_id
reference_type
scores
0
value 0.01195
scoring_system epss
scoring_elements 0.78874
published_at 2026-04-13T12:55:00Z
1
value 0.01195
scoring_system epss
scoring_elements 0.78845
published_at 2026-04-07T12:55:00Z
2
value 0.01195
scoring_system epss
scoring_elements 0.7887
published_at 2026-04-08T12:55:00Z
3
value 0.01195
scoring_system epss
scoring_elements 0.78876
published_at 2026-04-09T12:55:00Z
4
value 0.01195
scoring_system epss
scoring_elements 0.789
published_at 2026-04-11T12:55:00Z
5
value 0.01195
scoring_system epss
scoring_elements 0.78883
published_at 2026-04-12T12:55:00Z
6
value 0.01195
scoring_system epss
scoring_elements 0.78833
published_at 2026-04-02T12:55:00Z
7
value 0.01195
scoring_system epss
scoring_elements 0.78862
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-45492
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45492
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080152
reference_id 1080152
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1080152
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2308617
reference_id 2308617
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2308617
6
reference_url https://github.com/libexpat/libexpat/issues/889
reference_id 889
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-30T13:53:05Z/
url https://github.com/libexpat/libexpat/issues/889
7
reference_url https://github.com/libexpat/libexpat/pull/892
reference_id 892
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-08-30T13:53:05Z/
url https://github.com/libexpat/libexpat/pull/892
8
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
9
reference_url https://access.redhat.com/errata/RHSA-2024:10135
reference_id RHSA-2024:10135
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10135
10
reference_url https://access.redhat.com/errata/RHSA-2024:11109
reference_id RHSA-2024:11109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:11109
11
reference_url https://access.redhat.com/errata/RHSA-2024:6754
reference_id RHSA-2024:6754
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6754
12
reference_url https://access.redhat.com/errata/RHSA-2024:6989
reference_id RHSA-2024:6989
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:6989
13
reference_url https://access.redhat.com/errata/RHSA-2024:7213
reference_id RHSA-2024:7213
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7213
14
reference_url https://access.redhat.com/errata/RHSA-2024:7599
reference_id RHSA-2024:7599
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:7599
15
reference_url https://access.redhat.com/errata/RHSA-2024:9610
reference_id RHSA-2024:9610
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9610
16
reference_url https://usn.ubuntu.com/7000-1/
reference_id USN-7000-1
reference_type
scores
url https://usn.ubuntu.com/7000-1/
17
reference_url https://usn.ubuntu.com/7000-2/
reference_id USN-7000-2
reference_type
scores
url https://usn.ubuntu.com/7000-2/
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-45492
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nw3z-nwyg-87e5
9
url VCID-psgp-p8nd-wkcg
vulnerability_id VCID-psgp-p8nd-wkcg
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9603
reference_id
reference_type
scores
0
value 0.00121
scoring_system epss
scoring_elements 0.31042
published_at 2026-04-13T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31093
published_at 2026-04-08T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.31123
published_at 2026-04-09T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-11T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31086
published_at 2026-04-12T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.3117
published_at 2026-04-02T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.31217
published_at 2026-04-04T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31037
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9603
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9603
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9603
2
reference_url https://issues.chromium.org/issues/367818758
reference_id 367818758
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T16:03:30Z/
url https://issues.chromium.org/issues/367818758
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_8.html
reference_id stable-channel-update-for-desktop_8.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T16:03:30Z/
url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_8.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-9603
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-psgp-p8nd-wkcg
10
url VCID-skfq-61mt-8qhb
vulnerability_id VCID-skfq-61mt-8qhb
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10229
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17243
published_at 2026-04-13T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.1728
published_at 2026-04-08T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17339
published_at 2026-04-09T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17351
published_at 2026-04-11T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17301
published_at 2026-04-12T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17363
published_at 2026-04-02T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17409
published_at 2026-04-04T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17189
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10229
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10229
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10229
2
reference_url https://issues.chromium.org/issues/371011220
reference_id 371011220
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-23T14:37:18Z/
url https://issues.chromium.org/issues/371011220
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html
reference_id stable-channel-update-for-desktop_22.html
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-23T14:37:18Z/
url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_22.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-10229
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skfq-61mt-8qhb
11
url VCID-skhu-dhab-wfgj
vulnerability_id VCID-skhu-dhab-wfgj
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9120
reference_id
reference_type
scores
0
value 0.00226
scoring_system epss
scoring_elements 0.4542
published_at 2026-04-13T12:55:00Z
1
value 0.00226
scoring_system epss
scoring_elements 0.45371
published_at 2026-04-07T12:55:00Z
2
value 0.00226
scoring_system epss
scoring_elements 0.45426
published_at 2026-04-08T12:55:00Z
3
value 0.00226
scoring_system epss
scoring_elements 0.45449
published_at 2026-04-11T12:55:00Z
4
value 0.00226
scoring_system epss
scoring_elements 0.45419
published_at 2026-04-12T12:55:00Z
5
value 0.00226
scoring_system epss
scoring_elements 0.45407
published_at 2026-04-02T12:55:00Z
6
value 0.00226
scoring_system epss
scoring_elements 0.45427
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9120
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9120
2
reference_url https://issues.chromium.org/issues/365254285
reference_id 365254285
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T16:25:39Z/
url https://issues.chromium.org/issues/365254285
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_24.html
reference_id stable-channel-update-for-desktop_24.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-25T16:25:39Z/
url https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_24.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-9120
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-skhu-dhab-wfgj
12
url VCID-tvek-ujxy-mug2
vulnerability_id VCID-tvek-ujxy-mug2
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9602
reference_id
reference_type
scores
0
value 0.0035
scoring_system epss
scoring_elements 0.57474
published_at 2026-04-13T12:55:00Z
1
value 0.0035
scoring_system epss
scoring_elements 0.57497
published_at 2026-04-08T12:55:00Z
2
value 0.0035
scoring_system epss
scoring_elements 0.57501
published_at 2026-04-09T12:55:00Z
3
value 0.0035
scoring_system epss
scoring_elements 0.57516
published_at 2026-04-11T12:55:00Z
4
value 0.0035
scoring_system epss
scoring_elements 0.57493
published_at 2026-04-12T12:55:00Z
5
value 0.0035
scoring_system epss
scoring_elements 0.57444
published_at 2026-04-07T12:55:00Z
6
value 0.0035
scoring_system epss
scoring_elements 0.57467
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9602
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9602
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9602
2
reference_url https://issues.chromium.org/issues/368241697
reference_id 368241697
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T16:11:31Z/
url https://issues.chromium.org/issues/368241697
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_8.html
reference_id stable-channel-update-for-desktop_8.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-09T16:11:31Z/
url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_8.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-9602
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tvek-ujxy-mug2
13
url VCID-us37-cg5p-3fcc
vulnerability_id VCID-us37-cg5p-3fcc
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10487
reference_id
reference_type
scores
0
value 0.00298
scoring_system epss
scoring_elements 0.53183
published_at 2026-04-13T12:55:00Z
1
value 0.00298
scoring_system epss
scoring_elements 0.53171
published_at 2026-04-08T12:55:00Z
2
value 0.00298
scoring_system epss
scoring_elements 0.53163
published_at 2026-04-09T12:55:00Z
3
value 0.00298
scoring_system epss
scoring_elements 0.53214
published_at 2026-04-11T12:55:00Z
4
value 0.00298
scoring_system epss
scoring_elements 0.53199
published_at 2026-04-12T12:55:00Z
5
value 0.00298
scoring_system epss
scoring_elements 0.53128
published_at 2026-04-02T12:55:00Z
6
value 0.00298
scoring_system epss
scoring_elements 0.53152
published_at 2026-04-04T12:55:00Z
7
value 0.00298
scoring_system epss
scoring_elements 0.5312
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10487
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10487
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10487
2
reference_url https://issues.chromium.org/issues/375123371
reference_id 375123371
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-31T03:55:21Z/
url https://issues.chromium.org/issues/375123371
3
reference_url https://security.gentoo.org/glsa/202507-07
reference_id GLSA-202507-07
reference_type
scores
url https://security.gentoo.org/glsa/202507-07
4
reference_url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_29.html
reference_id stable-channel-update-for-desktop_29.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-10-31T03:55:21Z/
url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_29.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-10487
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-us37-cg5p-3fcc
14
url VCID-vwsy-zaxq-83e7
vulnerability_id VCID-vwsy-zaxq-83e7
summary Inappropriate implementation in Navigations in Google Chrome prior to 130.0.6723.58 allowed a remote attacker to bypass content security policy via a crafted HTML page. (Chromium security severity: Low)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-9966
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17328
published_at 2026-04-13T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.1736
published_at 2026-04-08T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17419
published_at 2026-04-09T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17432
published_at 2026-04-11T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17383
published_at 2026-04-12T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17441
published_at 2026-04-02T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17487
published_at 2026-04-04T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17268
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-9966
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9966
2
reference_url https://issues.chromium.org/issues/364773822
reference_id 364773822
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:41:38Z/
url https://issues.chromium.org/issues/364773822
3
reference_url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-16T19:41:38Z/
url https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-9966
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwsy-zaxq-83e7
15
url VCID-y533-phh6-h7ff
vulnerability_id VCID-y533-phh6-h7ff
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-10827
reference_id
reference_type
scores
0
value 0.00839
scoring_system epss
scoring_elements 0.74692
published_at 2026-04-13T12:55:00Z
1
value 0.00839
scoring_system epss
scoring_elements 0.74683
published_at 2026-04-08T12:55:00Z
2
value 0.00839
scoring_system epss
scoring_elements 0.74697
published_at 2026-04-09T12:55:00Z
3
value 0.00839
scoring_system epss
scoring_elements 0.74721
published_at 2026-04-11T12:55:00Z
4
value 0.00839
scoring_system epss
scoring_elements 0.747
published_at 2026-04-12T12:55:00Z
5
value 0.00839
scoring_system epss
scoring_elements 0.7465
published_at 2026-04-02T12:55:00Z
6
value 0.00839
scoring_system epss
scoring_elements 0.74676
published_at 2026-04-04T12:55:00Z
7
value 0.00839
scoring_system epss
scoring_elements 0.74651
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-10827
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10827
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10827
2
reference_url https://issues.chromium.org/issues/375065084
reference_id 375065084
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T17:04:09Z/
url https://issues.chromium.org/issues/375065084
3
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
4
reference_url https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T17:04:09Z/
url https://chromereleases.googleblog.com/2024/11/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6?arch=aarch64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community
aliases CVE-2024-10827
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y533-phh6-h7ff
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r6%3Farch=aarch64&distroversion=v3.23&reponame=community