Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qt6-qtwebengine@6.6.2-r1?arch=x86_64&distroversion=v3.20&reponame=community
Typeapk
Namespacealpine
Nameqt6-qtwebengine
Version6.6.2-r1
Qualifiers
arch x86_64
distroversion v3.20
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.6.3-r1
Latest_non_vulnerable_version6.6.3-r6
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-cwa7-2web-w7b2
vulnerability_id VCID-cwa7-2web-w7b2
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1671
reference_id
reference_type
scores
0
value 0.00077
scoring_system epss
scoring_elements 0.228
published_at 2026-04-29T12:55:00Z
1
value 0.00077
scoring_system epss
scoring_elements 0.23103
published_at 2026-04-11T12:55:00Z
2
value 0.00077
scoring_system epss
scoring_elements 0.23067
published_at 2026-04-12T12:55:00Z
3
value 0.00077
scoring_system epss
scoring_elements 0.23011
published_at 2026-04-13T12:55:00Z
4
value 0.00077
scoring_system epss
scoring_elements 0.23023
published_at 2026-04-16T12:55:00Z
5
value 0.00077
scoring_system epss
scoring_elements 0.23016
published_at 2026-04-18T12:55:00Z
6
value 0.00077
scoring_system epss
scoring_elements 0.22977
published_at 2026-04-21T12:55:00Z
7
value 0.00077
scoring_system epss
scoring_elements 0.2281
published_at 2026-04-24T12:55:00Z
8
value 0.00077
scoring_system epss
scoring_elements 0.22806
published_at 2026-04-26T12:55:00Z
9
value 0.00077
scoring_system epss
scoring_elements 0.23123
published_at 2026-04-02T12:55:00Z
10
value 0.00077
scoring_system epss
scoring_elements 0.23167
published_at 2026-04-04T12:55:00Z
11
value 0.00077
scoring_system epss
scoring_elements 0.22958
published_at 2026-04-07T12:55:00Z
12
value 0.00077
scoring_system epss
scoring_elements 0.23031
published_at 2026-04-08T12:55:00Z
13
value 0.00077
scoring_system epss
scoring_elements 0.23084
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1671
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1671
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1671
2
reference_url https://issues.chromium.org/issues/41487933
reference_id 41487933
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:32:23Z/
url https://issues.chromium.org/issues/41487933
3
reference_url https://security.gentoo.org/glsa/202412-05
reference_id GLSA-202412-05
reference_type
scores
url https://security.gentoo.org/glsa/202412-05
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/
reference_id PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:32:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
reference_id QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:32:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
6
reference_url https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html
reference_id stable-channel-update-for-desktop_20.html
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:32:23Z/
url https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2024-1671
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cwa7-2web-w7b2
1
url VCID-fsra-m4tw-fbhk
vulnerability_id VCID-fsra-m4tw-fbhk
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1672
reference_id
reference_type
scores
0
value 0.00102
scoring_system epss
scoring_elements 0.2791
published_at 2026-04-21T12:55:00Z
1
value 0.00102
scoring_system epss
scoring_elements 0.27639
published_at 2026-04-29T12:55:00Z
2
value 0.00102
scoring_system epss
scoring_elements 0.27714
published_at 2026-04-26T12:55:00Z
3
value 0.00102
scoring_system epss
scoring_elements 0.27826
published_at 2026-04-24T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28501
published_at 2026-04-08T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28631
published_at 2026-04-04T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28434
published_at 2026-04-07T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28541
published_at 2026-04-09T12:55:00Z
8
value 0.00105
scoring_system epss
scoring_elements 0.28542
published_at 2026-04-11T12:55:00Z
9
value 0.00105
scoring_system epss
scoring_elements 0.28499
published_at 2026-04-12T12:55:00Z
10
value 0.00105
scoring_system epss
scoring_elements 0.2845
published_at 2026-04-13T12:55:00Z
11
value 0.00105
scoring_system epss
scoring_elements 0.28466
published_at 2026-04-16T12:55:00Z
12
value 0.00105
scoring_system epss
scoring_elements 0.28443
published_at 2026-04-18T12:55:00Z
13
value 0.00105
scoring_system epss
scoring_elements 0.28588
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1672
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1672
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1672
2
reference_url https://issues.chromium.org/issues/41485789
reference_id 41485789
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:04:39Z/
url https://issues.chromium.org/issues/41485789
3
reference_url https://security.gentoo.org/glsa/202412-05
reference_id GLSA-202412-05
reference_type
scores
url https://security.gentoo.org/glsa/202412-05
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/
reference_id PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:04:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
reference_id QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:04:39Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
6
reference_url https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html
reference_id stable-channel-update-for-desktop_20.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:04:39Z/
url https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2024-1672
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fsra-m4tw-fbhk
2
url VCID-h1qs-sdxq-fqg7
vulnerability_id VCID-h1qs-sdxq-fqg7
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1676
reference_id
reference_type
scores
0
value 0.00325
scoring_system epss
scoring_elements 0.5545
published_at 2026-04-29T12:55:00Z
1
value 0.00325
scoring_system epss
scoring_elements 0.55542
published_at 2026-04-08T12:55:00Z
2
value 0.00325
scoring_system epss
scoring_elements 0.55543
published_at 2026-04-09T12:55:00Z
3
value 0.00325
scoring_system epss
scoring_elements 0.55553
published_at 2026-04-11T12:55:00Z
4
value 0.00325
scoring_system epss
scoring_elements 0.55532
published_at 2026-04-21T12:55:00Z
5
value 0.00325
scoring_system epss
scoring_elements 0.55551
published_at 2026-04-16T12:55:00Z
6
value 0.00325
scoring_system epss
scoring_elements 0.55555
published_at 2026-04-18T12:55:00Z
7
value 0.00325
scoring_system epss
scoring_elements 0.55456
published_at 2026-04-24T12:55:00Z
8
value 0.00325
scoring_system epss
scoring_elements 0.55476
published_at 2026-04-26T12:55:00Z
9
value 0.00325
scoring_system epss
scoring_elements 0.5549
published_at 2026-04-02T12:55:00Z
10
value 0.00325
scoring_system epss
scoring_elements 0.55514
published_at 2026-04-13T12:55:00Z
11
value 0.00325
scoring_system epss
scoring_elements 0.55491
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1676
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1676
2
reference_url https://issues.chromium.org/issues/40944847
reference_id 40944847
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-05T15:58:40Z/
url https://issues.chromium.org/issues/40944847
3
reference_url https://security.gentoo.org/glsa/202412-05
reference_id GLSA-202412-05
reference_type
scores
url https://security.gentoo.org/glsa/202412-05
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/
reference_id PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-05T15:58:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
reference_id QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-05T15:58:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
6
reference_url https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html
reference_id stable-channel-update-for-desktop_20.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-05T15:58:40Z/
url https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2024-1676
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h1qs-sdxq-fqg7
3
url VCID-kk71-tdbb-yqgp
vulnerability_id VCID-kk71-tdbb-yqgp
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-1670
reference_id
reference_type
scores
0
value 0.00519
scoring_system epss
scoring_elements 0.66867
published_at 2026-04-29T12:55:00Z
1
value 0.00519
scoring_system epss
scoring_elements 0.66848
published_at 2026-04-11T12:55:00Z
2
value 0.00519
scoring_system epss
scoring_elements 0.66834
published_at 2026-04-12T12:55:00Z
3
value 0.00519
scoring_system epss
scoring_elements 0.66802
published_at 2026-04-13T12:55:00Z
4
value 0.00519
scoring_system epss
scoring_elements 0.66835
published_at 2026-04-16T12:55:00Z
5
value 0.00519
scoring_system epss
scoring_elements 0.66849
published_at 2026-04-18T12:55:00Z
6
value 0.00519
scoring_system epss
scoring_elements 0.66833
published_at 2026-04-21T12:55:00Z
7
value 0.00519
scoring_system epss
scoring_elements 0.66857
published_at 2026-04-24T12:55:00Z
8
value 0.00519
scoring_system epss
scoring_elements 0.66871
published_at 2026-04-26T12:55:00Z
9
value 0.00519
scoring_system epss
scoring_elements 0.66767
published_at 2026-04-02T12:55:00Z
10
value 0.00519
scoring_system epss
scoring_elements 0.66792
published_at 2026-04-04T12:55:00Z
11
value 0.00519
scoring_system epss
scoring_elements 0.66764
published_at 2026-04-07T12:55:00Z
12
value 0.00519
scoring_system epss
scoring_elements 0.66814
published_at 2026-04-08T12:55:00Z
13
value 0.00519
scoring_system epss
scoring_elements 0.66828
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-1670
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1670
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1670
2
reference_url https://issues.chromium.org/issues/41481374
reference_id 41481374
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-21T16:10:10Z/
url https://issues.chromium.org/issues/41481374
3
reference_url https://security.gentoo.org/glsa/202412-05
reference_id GLSA-202412-05
reference_type
scores
url https://security.gentoo.org/glsa/202412-05
4
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/
reference_id PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-21T16:10:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/
5
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
reference_id QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-21T16:10:10Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/
6
reference_url https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html
reference_id stable-channel-update-for-desktop_20.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-21T16:10:10Z/
url https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1?arch=x86_64&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1?arch=x86_64&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1%3Farch=x86_64&distroversion=v3.20&reponame=community
aliases CVE-2024-1670
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kk71-tdbb-yqgp
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.2-r1%3Farch=x86_64&distroversion=v3.20&reponame=community