{"url":"http://public2.vulnerablecode.io/api/packages/508503?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4?arch=armv7&distroversion=v3.23&reponame=community","type":"apk","namespace":"alpine","name":"qt6-qtwebengine","version":"6.7.2-r4","qualifiers":{"arch":"armv7","distroversion":"v3.23","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"6.7.2-r5","latest_non_vulnerable_version":"6.10.1-r14","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47531?format=json","vulnerability_id":"VCID-3qva-pymb-uua7","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7972","reference_id":"","reference_type":"","scores":[{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70387","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70347","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70329","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70381","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70389","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70244","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70261","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70238","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70284","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70299","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70323","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70308","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70295","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00631","scoring_system":"epss","scoring_elements":"0.70338","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7972"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7972","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7972"},{"reference_url":"https://issues.chromium.org/issues/345960102","reference_id":"345960102","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-22T15:02:53Z/"}],"url":"https://issues.chromium.org/issues/345960102"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html","reference_id":"stable-channel-update-for-desktop_21.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-22T15:02:53Z/"}],"url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_21.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/508503?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-7972"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3qva-pymb-uua7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47547?format=json","vulnerability_id":"VCID-4vsx-3sh3-xfdn","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8636","reference_id":"","reference_type":"","scores":[{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68669","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68632","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.6861","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68658","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68664","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68532","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68551","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68529","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.6858","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68598","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68624","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68611","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68581","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0057","scoring_system":"epss","scoring_elements":"0.68621","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8636"},{"reference_url":"https://issues.chromium.org/issues/361461526","reference_id":"361461526","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-13T03:55:16Z/"}],"url":"https://issues.chromium.org/issues/361461526"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_10.html","reference_id":"stable-channel-update-for-desktop_10.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-13T03:55:16Z/"}],"url":"https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop_10.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/508503?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-8636"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4vsx-3sh3-xfdn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47544?format=json","vulnerability_id":"VCID-a6sr-d3nx-5bee","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8193","reference_id":"","reference_type":"","scores":[{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.7345","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73407","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.7344","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73452","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73321","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73345","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73354","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73367","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73391","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73371","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73363","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00762","scoring_system":"epss","scoring_elements":"0.73406","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8193"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8193","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8193"},{"reference_url":"https://issues.chromium.org/issues/360265320","reference_id":"360265320","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T14:33:50Z/"}],"url":"https://issues.chromium.org/issues/360265320"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html","reference_id":"stable-channel-update-for-desktop_28.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-29T14:33:50Z/"}],"url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/508503?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-8193"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a6sr-d3nx-5bee"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47546?format=json","vulnerability_id":"VCID-kubz-v57e-wfe4","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8198","reference_id":"","reference_type":"","scores":[{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56753","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56837","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56812","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56752","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56769","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56793","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56814","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.5679","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56841","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56845","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56853","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56831","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.56809","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00341","scoring_system":"epss","scoring_elements":"0.5684","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8198"},{"reference_url":"https://issues.chromium.org/issues/360758697","reference_id":"360758697","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-05T03:55:51Z/"}],"url":"https://issues.chromium.org/issues/360758697"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html","reference_id":"stable-channel-update-for-desktop_28.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-05T03:55:51Z/"}],"url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/508503?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-8198"],"risk_score":2.2,"exploitability":"0.5","weighted_severity":"4.5","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kubz-v57e-wfe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96385?format=json","vulnerability_id":"VCID-x9e4-duzt-kbet","summary":"Use after free in WebAudio in Google Chrome prior to 128.0.6613.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8362","reference_id":"","reference_type":"","scores":[{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.68022","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67982","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67964","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.68008","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.68017","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67893","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67891","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67942","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.6798","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67967","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67932","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00549","scoring_system":"epss","scoring_elements":"0.67969","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-8362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-8362"},{"reference_url":"https://issues.chromium.org/issues/357391257","reference_id":"357391257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-04T13:54:26Z/"}],"url":"https://issues.chromium.org/issues/357391257"},{"reference_url":"https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-04T13:54:26Z/"}],"url":"https://chromereleases.googleblog.com/2024/09/stable-channel-update-for-desktop.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/508503?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-8362"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x9e4-duzt-kbet"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47529?format=json","vulnerability_id":"VCID-y8by-xakp-37cd","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7969","reference_id":"","reference_type":"","scores":[{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38688","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38434","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3841","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38703","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38634","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38684","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38694","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38705","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.38666","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00173","scoring_system":"epss","scoring_elements":"0.3864","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-7969"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7969","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7969"},{"reference_url":"https://issues.chromium.org/issues/351865302","reference_id":"351865302","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-05T03:55:48Z/"}],"url":"https://issues.chromium.org/issues/351865302"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html","reference_id":"stable-channel-update-for-desktop_28.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-09-05T03:55:48Z/"}],"url":"https://chromereleases.googleblog.com/2024/08/stable-channel-update-for-desktop_28.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/508503?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-7969"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y8by-xakp-37cd"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.7.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}