{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","type":"apk","namespace":"alpine","name":"qt5-qtwebengine","version":"5.15.17-r0","qualifiers":{"arch":"s390x","distroversion":"v3.23","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.15.17-r1","latest_non_vulnerable_version":"5.15.17-r10","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47508?format=json","vulnerability_id":"VCID-5hry-b8fp-qqet","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6996","reference_id":"","reference_type":"","scores":[{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22378","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22646","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22491","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22482","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22481","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22628","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22703","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22754","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22776","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22738","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22681","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22697","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22695","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6996"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6996","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6996"},{"reference_url":"https://issues.chromium.org/issues/333708039","reference_id":"333708039","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T18:06:30Z/"}],"url":"https://issues.chromium.org/issues/333708039"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-08T18:06:30Z/"}],"url":"https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-6996"],"risk_score":0.9,"exploitability":"0.5","weighted_severity":"1.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5hry-b8fp-qqet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96131?format=json","vulnerability_id":"VCID-as76-9ntp-y3bp","summary":"Use after free in QUIC in Google Chrome prior to 124.0.6367.60 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3837","reference_id":"","reference_type":"","scores":[{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57358","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57404","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57389","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57386","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57335","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57385","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57363","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57383","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.6598","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.66005","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00499","scoring_system":"epss","scoring_elements":"0.65994","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3837"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3837","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3837"},{"reference_url":"https://issues.chromium.org/issues/41491379","reference_id":"41491379","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T14:30:56Z/"}],"url":"https://issues.chromium.org/issues/41491379"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","reference_id":"CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T14:30:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","reference_id":"IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T14:30:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","reference_id":"M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T14:30:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","reference_id":"PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T14:30:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","reference_id":"stable-channel-update-for-desktop_16.html","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T14:30:56Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T14:30:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","reference_id":"WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-22T14:30:56Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-3837"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-as76-9ntp-y3bp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47468?format=json","vulnerability_id":"VCID-cwf5-rgck-rbbt","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4058","reference_id":"","reference_type":"","scores":[{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91027","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91003","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90933","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90963","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.9097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90978","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4058"},{"reference_url":"https://issues.chromium.org/issues/332546345","reference_id":"332546345","reference_type":"","scores":[{"value":"9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-01T15:03:12Z/"}],"url":"https://issues.chromium.org/issues/332546345"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html","reference_id":"stable-channel-update-for-desktop_24.html","reference_type":"","scores":[{"value":"9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-01T15:03:12Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-01T15:03:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-4058"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwf5-rgck-rbbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96133?format=json","vulnerability_id":"VCID-d4gt-rndb-wbat","summary":"Out of bounds read in Fonts in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3839","reference_id":"","reference_type":"","scores":[{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41393","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41388","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41568","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41596","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41523","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41573","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41582","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41603","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.4157","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41556","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41602","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41576","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.415","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41177","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00196","scoring_system":"epss","scoring_elements":"0.41311","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3839"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3839","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3839"},{"reference_url":"https://issues.chromium.org/issues/41491859","reference_id":"41491859","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T18:56:16Z/"}],"url":"https://issues.chromium.org/issues/41491859"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","reference_id":"CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T18:56:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","reference_id":"IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T18:56:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","reference_id":"M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T18:56:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","reference_id":"PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T18:56:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","reference_id":"stable-channel-update-for-desktop_16.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T18:56:16Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T18:56:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","reference_id":"WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-23T18:56:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-3839"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-d4gt-rndb-wbat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47504?format=json","vulnerability_id":"VCID-fbem-1qpe-aqda","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6989","reference_id":"","reference_type":"","scores":[{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50696","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50856","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50805","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50814","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50773","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50791","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50817","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50774","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50831","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50871","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50847","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50832","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00274","scoring_system":"epss","scoring_elements":"0.50877","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6989"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6989","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6989"},{"reference_url":"https://issues.chromium.org/issues/349342289","reference_id":"349342289","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:01:11Z/"}],"url":"https://issues.chromium.org/issues/349342289"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-07T20:01:11Z/"}],"url":"https://chromereleases.googleblog.com/2024/07/stable-channel-update-for-desktop_23.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-6989"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fbem-1qpe-aqda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47497?format=json","vulnerability_id":"VCID-qdnt-cuvg-nke1","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5846","reference_id":"","reference_type":"","scores":[{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65408","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65392","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65379","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65387","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65397","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65381","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65399","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65411","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.6532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65346","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.6531","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65362","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00485","scoring_system":"epss","scoring_elements":"0.65373","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5846"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5846","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5846"},{"reference_url":"https://issues.chromium.org/issues/341095523","reference_id":"341095523","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T12:43:31Z/"}],"url":"https://issues.chromium.org/issues/341095523"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/","reference_id":"7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T12:43:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7VXA32LXMNK3DSK3JBRLTBPFUH7LTODU/"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/","reference_id":"MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T12:43:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MPU7AB53QQVNTBPGRMJRY5SXJNYWW3FX/"},{"reference_url":"https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T12:43:31Z/"}],"url":"https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-5846"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qdnt-cuvg-nke1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47522?format=json","vulnerability_id":"VCID-rzpj-7mb5-cudf","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7536","reference_id":"","reference_type":"","scores":[{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57419","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57511","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.5747","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57489","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57469","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.5748","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57502","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57479","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57535","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57551","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.5753","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57509","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0035","scoring_system":"epss","scoring_elements":"0.57536","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7536"},{"reference_url":"https://issues.chromium.org/issues/354847246","reference_id":"354847246","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T20:36:54Z/"}],"url":"https://issues.chromium.org/issues/354847246"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-06T20:36:54Z/"}],"url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-7536"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rzpj-7mb5-cudf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47471?format=json","vulnerability_id":"VCID-u1sp-38g8-xfan","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4558","reference_id":"","reference_type":"","scores":[{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85059","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.84992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85013","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85014","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85011","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85036","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85045","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85043","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85503","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689","reference_id":"2279689","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689"},{"reference_url":"https://issues.chromium.org/issues/337766133","reference_id":"337766133","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://issues.chromium.org/issues/337766133"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","reference_id":"6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/","reference_id":"BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/","reference_id":"FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","reference_id":"IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","reference_id":"LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html","reference_id":"stable-channel-update-for-desktop_7.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-4558"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u1sp-38g8-xfan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96154?format=json","vulnerability_id":"VCID-u3qp-1wrx-6fg1","summary":"Use after free in V8 in Google Chrome prior to 124.0.6367.60 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3914","reference_id":"","reference_type":"","scores":[{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49178","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49184","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.4913","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49149","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49191","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49221","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49223","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49177","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49172","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49198","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00258","scoring_system":"epss","scoring_elements":"0.49181","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56456","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56521","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56502","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3914"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3914","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3914"},{"reference_url":"https://issues.chromium.org/issues/330759272","reference_id":"330759272","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T15:38:34Z/"}],"url":"https://issues.chromium.org/issues/330759272"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","reference_id":"CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T15:38:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","reference_id":"IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T15:38:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","reference_id":"M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T15:38:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","reference_id":"PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T15:38:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","reference_id":"stable-channel-update-for-desktop_16.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T15:38:34Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T15:38:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","reference_id":"WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-19T15:38:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-3914"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u3qp-1wrx-6fg1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96289?format=json","vulnerability_id":"VCID-w5hn-55q7-9udm","summary":"Use after free in Media Session in Google Chrome prior to 125.0.6422.141 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5496","reference_id":"","reference_type":"","scores":[{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75503","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75422","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75411","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75453","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75458","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75448","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75483","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75487","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75492","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75361","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75393","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75372","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75415","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75424","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00884","scoring_system":"epss","scoring_elements":"0.75444","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-5496"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5496","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-5496"},{"reference_url":"https://issues.chromium.org/issues/338929744","reference_id":"338929744","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-03T17:08:31Z/"}],"url":"https://issues.chromium.org/issues/338929744"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/","reference_id":"D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-03T17:08:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D5SQOWDIVBXQYQPPBSCH7EFISYAOCTHD/"},{"reference_url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html","reference_id":"stable-channel-update-for-desktop_30.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-03T17:08:31Z/"}],"url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_30.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/","reference_id":"ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-03T17:08:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZW4TZXVPN3NLZ4UDGZP6OASUM4OVLXX2/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-5496"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w5hn-55q7-9udm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47500?format=json","vulnerability_id":"VCID-xgyr-vdpb-sfc4","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6291","reference_id":"","reference_type":"","scores":[{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.50948","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51094","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51078","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51117","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51123","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.511","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51048","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51056","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51016","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51036","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.5106","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51018","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51075","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51071","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00276","scoring_system":"epss","scoring_elements":"0.51115","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-6291"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6291","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6291"},{"reference_url":"https://issues.chromium.org/issues/40942995","reference_id":"40942995","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-26T03:55:30Z/"}],"url":"https://issues.chromium.org/issues/40942995"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html","reference_id":"stable-channel-update-for-desktop_24.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-26T03:55:30Z/"}],"url":"https://chromereleases.googleblog.com/2024/06/stable-channel-update-for-desktop_24.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/","reference_id":"T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-26T03:55:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6OJ65HWXYSYMH55VDO6N36EOZFUNL4O/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/","reference_id":"WHV5WTU27YOIBIM2CON42SHWY6J2HPRS","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-26T03:55:30Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WHV5WTU27YOIBIM2CON42SHWY6J2HPRS/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/401964?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-6291"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xgyr-vdpb-sfc4"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r0%3Farch=s390x&distroversion=v3.23&reponame=community"}