{"url":"http://public2.vulnerablecode.io/api/packages/462111?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.16-r11?arch=ppc64le&distroversion=v3.20&reponame=community","type":"apk","namespace":"alpine","name":"qt5-qtwebengine","version":"5.15.16-r11","qualifiers":{"arch":"ppc64le","distroversion":"v3.20","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.15.16-r12","latest_non_vulnerable_version":"5.15.16-r15","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47547?format=json","vulnerability_id":"VCID-4vsx-3sh3-xfdn","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8636","reference_id":"","reference_type":"","scores":[{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68669","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68632","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.6861","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68658","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68664","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68551","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68529","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.6858","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68598","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68621","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8636"},{"reference_url":"https://issues.chromium.org/issues/361461526","reference_id":"361461526","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-13T03:55:16Z/"}],"url":"https://issues.chromium.org/issues/361461526"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_10.html","reference_id":"stable-channel-update-for-desktop_10.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-13T03:55:16Z/"}],"url":"https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_10.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/462111?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.16-r11?arch=ppc64le&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.16-r11%3Farch=ppc64le&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2024-8636"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4vsx-3sh3-xfdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47473?format=json","vulnerability_id":"VCID-6mue-56py-gkhg","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4761.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4761.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4761","reference_id":"","reference_type":"","scores":[{"value":"0.02473","scoring_system":"epss","scoring_elements":"0.85323","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02473","scoring_system":"epss","scoring_elements":"0.85255","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02473","scoring_system":"epss","scoring_elements":"0.85264","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02473","scoring_system":"epss","scoring_elements":"0.85278","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02473","scoring_system":"epss","scoring_elements":"0.85276","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02473","scoring_system":"epss","scoring_elements":"0.85273","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02473","scoring_system":"epss","scoring_elements":"0.85294","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02473","scoring_system":"epss","scoring_elements":"0.85295","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0254","scoring_system":"epss","scoring_elements":"0.85417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0254","scoring_system":"epss","scoring_elements":"0.85483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0254","scoring_system":"epss","scoring_elements":"0.85506","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0254","scoring_system":"epss","scoring_elements":"0.85515","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0254","scoring_system":"epss","scoring_elements":"0.8542","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05239","scoring_system":"epss","scoring_elements":"0.8993","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4761"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4761","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4761"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280589","reference_id":"2280589","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2280589"},{"reference_url":"https://issues.chromium.org/issues/339458194","reference_id":"339458194","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-19T14:10:45Z/"}],"url":"https://issues.chromium.org/issues/339458194"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","reference_id":"6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-19T14:10:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/","reference_id":"NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-19T14:10:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NTSN22LNYXMWHVTYNOYQVOY7VDZFHENQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_13.html","reference_id":"stable-channel-update-for-desktop_13.html","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-19T14:10:45Z/"}],"url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_13.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/","reference_id":"WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-19T14:10:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSUWM73ZCXTN62AT2REYQDD5ZKPFMDZD/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/462111?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.16-r11?arch=ppc64le&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.16-r11%3Farch=ppc64le&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2024-4761"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6mue-56py-gkhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47530?format=json","vulnerability_id":"VCID-c53f-mhak-hqf3","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7971.json","reference_id":"","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-7971.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7971","reference_id":"","reference_type":"","scores":[{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76947","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00988","scoring_system":"epss","scoring_elements":"0.76935","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77106","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77134","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77054","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77082","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77064","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01011","scoring_system":"epss","scoring_elements":"0.77096","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01452","scoring_system":"epss","scoring_elements":"0.80792","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01452","scoring_system":"epss","scoring_elements":"0.80831","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01452","scoring_system":"epss","scoring_elements":"0.808","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01452","scoring_system":"epss","scoring_elements":"0.80829","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01492","scoring_system":"epss","scoring_elements":"0.81101","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01492","scoring_system":"epss","scoring_elements":"0.81124","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7971"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7971","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7971"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307092","reference_id":"2307092","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2307092"},{"reference_url":"https://issues.chromium.org/issues/360700873","reference_id":"360700873","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-26T14:07:05Z/"}],"url":"https://issues.chromium.org/issues/360700873"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html","reference_id":"stable-channel-update-for-desktop_21.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-08-26T14:07:05Z/"}],"url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/462111?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.16-r11?arch=ppc64le&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.16-r11%3Farch=ppc64le&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2024-7971"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c53f-mhak-hqf3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47546?format=json","vulnerability_id":"VCID-kubz-v57e-wfe4","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8198","reference_id":"","reference_type":"","scores":[{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56753","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56837","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56812","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56752","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56814","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.5679","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.5684","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8198"},{"reference_url":"https://issues.chromium.org/issues/360758697","reference_id":"360758697","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-05T03:55:51Z/"}],"url":"https://issues.chromium.org/issues/360758697"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html","reference_id":"stable-channel-update-for-desktop_28.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-05T03:55:51Z/"}],"url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/462111?format=json","purl":"pkg:apk/alpine/qt5-qtwebengine@5.15.16-r11?arch=ppc64le&distroversion=v3.20&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.16-r11%3Farch=ppc64le&distroversion=v3.20&reponame=community"}],"aliases":["CVE-2024-8198"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kubz-v57e-wfe4"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.16-r11%3Farch=ppc64le&distroversion=v3.20&reponame=community"}