{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","type":"ebuild","namespace":"www-client","name":"opera","version":"124.0.2478.97","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"124.0.6367.155","latest_non_vulnerable_version":"141.0.7390.107","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59076?format=json","vulnerability_id":"VCID-4rsu-dm7j-pkbt","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1674","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10771","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10594","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1059","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10537","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10493","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10631","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10698","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10679","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10721","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10622","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10684","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10547","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10678","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1066","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10636","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.105","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10518","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10643","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1674"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1674","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1674"},{"reference_url":"https://issues.chromium.org/issues/40095183","reference_id":"40095183","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-20T18:52:13Z/"}],"url":"https://issues.chromium.org/issues/40095183"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","reference_id":"PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-20T18:52:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","reference_id":"QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-20T18:52:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"},{"reference_url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","reference_id":"stable-channel-update-for-desktop_20.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-20T18:52:13Z/"}],"url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-1674"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4rsu-dm7j-pkbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47469?format=json","vulnerability_id":"VCID-4x4d-qvt8-93hx","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4059","reference_id":"","reference_type":"","scores":[{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39767","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39801","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39672","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39737","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39756","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39671","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39695","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40162","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40188","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40111","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40165","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40177","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.4015","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40131","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.4018","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40151","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.40071","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39898","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00184","scoring_system":"epss","scoring_elements":"0.39882","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4059"},{"reference_url":"https://issues.chromium.org/issues/333182464","reference_id":"333182464","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T13:45:44Z/"}],"url":"https://issues.chromium.org/issues/333182464"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html","reference_id":"stable-channel-update-for-desktop_24.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T13:45:44Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T13:45:44Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-4059"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4x4d-qvt8-93hx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59079?format=json","vulnerability_id":"VCID-5yx6-q3fm-3kfh","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2173","reference_id":"","reference_type":"","scores":[{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34493","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34413","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34452","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34467","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34431","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34456","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34495","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34554","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34464","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.3795","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38108","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38015","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37901","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37972","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37983","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37897","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37873","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38132","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40372","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2173"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2173","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2173"},{"reference_url":"https://issues.chromium.org/issues/325893559","reference_id":"325893559","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:12Z/"}],"url":"https://issues.chromium.org/issues/325893559"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/","reference_id":"OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"6.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-25T04:00:12Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2173"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"6.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5yx6-q3fm-3kfh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59069?format=json","vulnerability_id":"VCID-6qzb-mjpe-8qey","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1669","reference_id":"","reference_type":"","scores":[{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57076","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56981","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56982","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56931","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56978","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57039","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.5699","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57015","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57028","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.5705","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57027","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57078","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57079","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57091","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.5707","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57046","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57074","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57071","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57048","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1669"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1669","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1669"},{"reference_url":"https://issues.chromium.org/issues/41495060","reference_id":"41495060","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-31T14:56:31Z/"}],"url":"https://issues.chromium.org/issues/41495060"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","reference_id":"PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-31T14:56:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","reference_id":"QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-31T14:56:31Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"},{"reference_url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","reference_id":"stable-channel-update-for-desktop_20.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-10-31T14:56:31Z/"}],"url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-1669"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6qzb-mjpe-8qey"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59095?format=json","vulnerability_id":"VCID-6u7f-hc3c-87fu","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2885","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32207","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32139","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32117","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32209","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32199","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37974","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37856","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38068","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39684","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40216","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.5345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53445","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53496","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53493","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53508","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53549","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2885"},{"reference_url":"https://issues.chromium.org/issues/328958020","reference_id":"328958020","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-30T04:00:28Z/"}],"url":"https://issues.chromium.org/issues/328958020"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","reference_id":"3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-30T04:00:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","reference_id":"G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-30T04:00:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/","reference_id":"IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-30T04:00:28Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","reference_id":"stable-channel-update-for-desktop_26.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-30T04:00:28Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2885"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6u7f-hc3c-87fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59097?format=json","vulnerability_id":"VCID-8nzh-a7kr-gqem","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2886","reference_id":"","reference_type":"","scores":[{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76667","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76649","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76639","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.767","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.7672","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76692","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00975","scoring_system":"epss","scoring_elements":"0.76681","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79888","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01317","scoring_system":"epss","scoring_elements":"0.79886","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01495","scoring_system":"epss","scoring_elements":"0.81271","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01495","scoring_system":"epss","scoring_elements":"0.81193","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01495","scoring_system":"epss","scoring_elements":"0.81215","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01495","scoring_system":"epss","scoring_elements":"0.81211","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01495","scoring_system":"epss","scoring_elements":"0.81229","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01834","scoring_system":"epss","scoring_elements":"0.83021","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01834","scoring_system":"epss","scoring_elements":"0.82994","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01834","scoring_system":"epss","scoring_elements":"0.82998","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01834","scoring_system":"epss","scoring_elements":"0.82984","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0188","scoring_system":"epss","scoring_elements":"0.83182","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2886"},{"reference_url":"https://issues.chromium.org/issues/330575496","reference_id":"330575496","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-30T04:00:29Z/"}],"url":"https://issues.chromium.org/issues/330575496"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","reference_id":"3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-30T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","reference_id":"G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-30T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/","reference_id":"IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-30T04:00:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","reference_id":"stable-channel-update-for-desktop_26.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-30T04:00:29Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2886"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8nzh-a7kr-gqem"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59090?format=json","vulnerability_id":"VCID-997t-9tzj-nybs","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2627","reference_id":"","reference_type":"","scores":[{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67562","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67561","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00539","scoring_system":"epss","scoring_elements":"0.67583","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72627","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72644","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72621","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72609","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72669","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00728","scoring_system":"epss","scoring_elements":"0.72659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76669","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76525","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76596","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.76613","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.766","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00962","scoring_system":"epss","scoring_elements":"0.7662","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01209","scoring_system":"epss","scoring_elements":"0.79076","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01209","scoring_system":"epss","scoring_elements":"0.79039","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01209","scoring_system":"epss","scoring_elements":"0.79045","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01209","scoring_system":"epss","scoring_elements":"0.79061","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2627"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2627","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2627"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","reference_id":"2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-11T04:01:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/"},{"reference_url":"https://issues.chromium.org/issues/41493290","reference_id":"41493290","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-11T04:01:24Z/"}],"url":"https://issues.chromium.org/issues/41493290"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","reference_id":"6JINDYFB3MPH43ECTI72BV63K4RXSG22","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-11T04:01:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","reference_id":"AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-11T04:01:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","reference_id":"stable-channel-update-for-desktop_19.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-11T04:01:24Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2627"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-997t-9tzj-nybs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59100?format=json","vulnerability_id":"VCID-9bqq-9jac-33dj","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3156","reference_id":"","reference_type":"","scores":[{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83914","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83881","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83865","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83848","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83827","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02015","scoring_system":"epss","scoring_elements":"0.83796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83963","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83987","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83988","published_at":"2026-04-21T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.84015","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83967","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83909","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83925","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83928","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83951","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83958","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02075","scoring_system":"epss","scoring_elements":"0.83973","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3156"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3156","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3156"},{"reference_url":"https://issues.chromium.org/issues/329130358","reference_id":"329130358","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-19T17:41:58Z/"}],"url":"https://issues.chromium.org/issues/329130358"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/","reference_id":"EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-19T17:41:58Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-19T17:41:58Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-3156"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9bqq-9jac-33dj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59086?format=json","vulnerability_id":"VCID-a9md-7mxf-kkdb","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2625","reference_id":"","reference_type":"","scores":[{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.72005","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71981","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00701","scoring_system":"epss","scoring_elements":"0.71985","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76358","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76313","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76317","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76339","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76312","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76298","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00945","scoring_system":"epss","scoring_elements":"0.76353","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01354","scoring_system":"epss","scoring_elements":"0.80145","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01391","scoring_system":"epss","scoring_elements":"0.80555","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01391","scoring_system":"epss","scoring_elements":"0.80421","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01391","scoring_system":"epss","scoring_elements":"0.80483","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01391","scoring_system":"epss","scoring_elements":"0.80502","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01391","scoring_system":"epss","scoring_elements":"0.80498","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01391","scoring_system":"epss","scoring_elements":"0.80515","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01429","scoring_system":"epss","scoring_elements":"0.80735","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01429","scoring_system":"epss","scoring_elements":"0.80718","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01429","scoring_system":"epss","scoring_elements":"0.80705","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2625"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2625","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2625"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","reference_id":"2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:24:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/"},{"reference_url":"https://issues.chromium.org/issues/327740539","reference_id":"327740539","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:24:07Z/"}],"url":"https://issues.chromium.org/issues/327740539"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","reference_id":"6JINDYFB3MPH43ECTI72BV63K4RXSG22","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:24:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","reference_id":"AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:24:07Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","reference_id":"stable-channel-update-for-desktop_19.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:24:07Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2625"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-a9md-7mxf-kkdb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59075?format=json","vulnerability_id":"VCID-bsuh-szcs-rbhr","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1673","reference_id":"","reference_type":"","scores":[{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69487","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69518","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69484","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69441","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69459","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69464","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69558","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69511","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.694","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00597","scoring_system":"epss","scoring_elements":"0.69451","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69843","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69779","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69795","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69771","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69819","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69834","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69857","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.69828","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.6987","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00613","scoring_system":"epss","scoring_elements":"0.6988","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1673"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1673","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1673"},{"reference_url":"https://issues.chromium.org/issues/41490491","reference_id":"41490491","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:02:55Z/"}],"url":"https://issues.chromium.org/issues/41490491"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","reference_id":"PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:02:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","reference_id":"QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:02:55Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"},{"reference_url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","reference_id":"stable-channel-update-for-desktop_20.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:Y/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:02:55Z/"}],"url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-1673"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bsuh-szcs-rbhr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59102?format=json","vulnerability_id":"VCID-cbcv-2prm-rygz","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3159","reference_id":"","reference_type":"","scores":[{"value":"0.06128","scoring_system":"epss","scoring_elements":"0.9088","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06128","scoring_system":"epss","scoring_elements":"0.90843","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06128","scoring_system":"epss","scoring_elements":"0.9087","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06128","scoring_system":"epss","scoring_elements":"0.90872","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06128","scoring_system":"epss","scoring_elements":"0.90861","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06128","scoring_system":"epss","scoring_elements":"0.90891","published_at":"2026-05-14T12:55:00Z"},{"value":"0.06128","scoring_system":"epss","scoring_elements":"0.90831","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06128","scoring_system":"epss","scoring_elements":"0.90827","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90982","published_at":"2026-04-16T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.9098","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90981","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90994","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90957","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90911","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90921","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90932","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90943","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90949","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90958","published_at":"2026-04-11T12:55:00Z"},{"value":"0.06301","scoring_system":"epss","scoring_elements":"0.90959","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3159"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3159","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3159"},{"reference_url":"https://issues.chromium.org/issues/330760873","reference_id":"330760873","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-11T04:01:32Z/"}],"url":"https://issues.chromium.org/issues/330760873"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/","reference_id":"EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-11T04:01:32Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-04-11T04:01:32Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-3159"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cbcv-2prm-rygz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59083?format=json","vulnerability_id":"VCID-cfav-qfak-gyc6","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2176","reference_id":"","reference_type":"","scores":[{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76471","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76474","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76488","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76484","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76444","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76449","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76389","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00957","scoring_system":"epss","scoring_elements":"0.76445","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80153","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.8006","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80083","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80098","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80096","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01333","scoring_system":"epss","scoring_elements":"0.80111","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80269","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80275","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01369","scoring_system":"epss","scoring_elements":"0.80291","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2176"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2176","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2176"},{"reference_url":"https://issues.chromium.org/issues/325936438","reference_id":"325936438","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-08T20:51:42Z/"}],"url":"https://issues.chromium.org/issues/325936438"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/","reference_id":"OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-08T20:51:42Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-08T20:51:42Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2176"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cfav-qfak-gyc6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59073?format=json","vulnerability_id":"VCID-cwa7-2web-w7b2","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1671","reference_id":"","reference_type":"","scores":[{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22919","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.2281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22806","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.228","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.227","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22786","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22863","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22828","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22843","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23123","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23167","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22958","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23031","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23084","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23103","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23067","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23011","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23023","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.23016","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00077","scoring_system":"epss","scoring_elements":"0.22977","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1671"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1671","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1671"},{"reference_url":"https://issues.chromium.org/issues/41487933","reference_id":"41487933","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:32:23Z/"}],"url":"https://issues.chromium.org/issues/41487933"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","reference_id":"PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:32:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","reference_id":"QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:32:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"},{"reference_url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","reference_id":"stable-channel-update-for-desktop_20.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-02-21T20:32:23Z/"}],"url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-1671"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwa7-2web-w7b2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47468?format=json","vulnerability_id":"VCID-cwf5-rgck-rbbt","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4058","reference_id":"","reference_type":"","scores":[{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91012","published_at":"2026-04-29T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91062","published_at":"2026-05-12T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91053","published_at":"2026-05-11T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91055","published_at":"2026-05-09T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91041","published_at":"2026-05-07T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91027","published_at":"2026-05-05T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90933","published_at":"2026-04-02T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90942","published_at":"2026-04-04T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90952","published_at":"2026-04-07T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90963","published_at":"2026-04-08T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.9097","published_at":"2026-04-09T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90978","published_at":"2026-04-13T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.90979","published_at":"2026-04-12T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91003","published_at":"2026-04-21T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91001","published_at":"2026-04-18T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91017","published_at":"2026-04-24T12:55:00Z"},{"value":"0.06327","scoring_system":"epss","scoring_elements":"0.91015","published_at":"2026-04-26T12:55:00Z"},{"value":"0.06526","scoring_system":"epss","scoring_elements":"0.91213","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4058"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4058","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4058"},{"reference_url":"https://issues.chromium.org/issues/332546345","reference_id":"332546345","reference_type":"","scores":[{"value":"9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-01T15:03:12Z/"}],"url":"https://issues.chromium.org/issues/332546345"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html","reference_id":"stable-channel-update-for-desktop_24.html","reference_type":"","scores":[{"value":"9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-01T15:03:12Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-01T15:03:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-4058"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.1","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cwf5-rgck-rbbt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59101?format=json","vulnerability_id":"VCID-dvgp-y1pz-1ff8","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3158","reference_id":"","reference_type":"","scores":[{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.8047","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80418","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80453","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80458","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.8044","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80512","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80384","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01385","scoring_system":"epss","scoring_elements":"0.80401","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80658","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.8066","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80661","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80686","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80629","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80582","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80604","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80596","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80624","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80634","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.8065","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01427","scoring_system":"epss","scoring_elements":"0.80637","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3158"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3158","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3158"},{"reference_url":"https://issues.chromium.org/issues/329965696","reference_id":"329965696","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-11T04:01:33Z/"}],"url":"https://issues.chromium.org/issues/329965696"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/","reference_id":"EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-11T04:01:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-04-11T04:01:33Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-3158"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvgp-y1pz-1ff8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59098?format=json","vulnerability_id":"VCID-fkyq-rccj-fuan","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2887","reference_id":"","reference_type":"","scores":[{"value":"0.03715","scoring_system":"epss","scoring_elements":"0.87973","published_at":"2026-04-09T12:55:00Z"},{"value":"0.03715","scoring_system":"epss","scoring_elements":"0.87976","published_at":"2026-04-13T12:55:00Z"},{"value":"0.03715","scoring_system":"epss","scoring_elements":"0.87984","published_at":"2026-04-11T12:55:00Z"},{"value":"0.03715","scoring_system":"epss","scoring_elements":"0.87946","published_at":"2026-04-07T12:55:00Z"},{"value":"0.03715","scoring_system":"epss","scoring_elements":"0.87966","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88839","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04295","scoring_system":"epss","scoring_elements":"0.88823","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04919","scoring_system":"epss","scoring_elements":"0.8963","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04919","scoring_system":"epss","scoring_elements":"0.89629","published_at":"2026-04-16T12:55:00Z"},{"value":"0.08547","scoring_system":"epss","scoring_elements":"0.92411","published_at":"2026-04-21T12:55:00Z"},{"value":"0.09572","scoring_system":"epss","scoring_elements":"0.92894","published_at":"2026-05-05T12:55:00Z"},{"value":"0.09572","scoring_system":"epss","scoring_elements":"0.92885","published_at":"2026-04-29T12:55:00Z"},{"value":"0.09572","scoring_system":"epss","scoring_elements":"0.9289","published_at":"2026-04-26T12:55:00Z"},{"value":"0.09572","scoring_system":"epss","scoring_elements":"0.92887","published_at":"2026-04-24T12:55:00Z"},{"value":"0.12241","scoring_system":"epss","scoring_elements":"0.93928","published_at":"2026-05-14T12:55:00Z"},{"value":"0.12241","scoring_system":"epss","scoring_elements":"0.93895","published_at":"2026-05-07T12:55:00Z"},{"value":"0.12241","scoring_system":"epss","scoring_elements":"0.93906","published_at":"2026-05-09T12:55:00Z"},{"value":"0.12241","scoring_system":"epss","scoring_elements":"0.93909","published_at":"2026-05-11T12:55:00Z"},{"value":"0.12241","scoring_system":"epss","scoring_elements":"0.93913","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2887"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2887","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2887"},{"reference_url":"https://issues.chromium.org/issues/330588502","reference_id":"330588502","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-04T04:00:11Z/"}],"url":"https://issues.chromium.org/issues/330588502"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","reference_id":"3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-04T04:00:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","reference_id":"G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-04T04:00:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/","reference_id":"IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-04T04:00:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","reference_id":"stable-channel-update-for-desktop_26.html","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-05-04T04:00:11Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2887"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fkyq-rccj-fuan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59074?format=json","vulnerability_id":"VCID-fsra-m4tw-fbhk","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1672","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27471","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2755","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27528","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27468","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27714","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27639","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27564","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27487","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.2791","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.27826","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28499","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28588","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28631","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28501","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28541","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2845","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28466","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28443","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1672"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1672","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1672"},{"reference_url":"https://issues.chromium.org/issues/41485789","reference_id":"41485789","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:04:39Z/"}],"url":"https://issues.chromium.org/issues/41485789"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","reference_id":"PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:04:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","reference_id":"QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:04:39Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"},{"reference_url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","reference_id":"stable-channel-update-for-desktop_20.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-07-17T18:04:39Z/"}],"url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-1672"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fsra-m4tw-fbhk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47472?format=json","vulnerability_id":"VCID-g8mm-2jmc-zuh3","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4559","reference_id":"","reference_type":"","scores":[{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61304","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.6129","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61242","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61292","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61299","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61282","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61295","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61316","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61311","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61271","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61289","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61255","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61221","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61269","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00409","scoring_system":"epss","scoring_elements":"0.61283","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00561","scoring_system":"epss","scoring_elements":"0.68493","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00561","scoring_system":"epss","scoring_elements":"0.68444","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00561","scoring_system":"epss","scoring_elements":"0.68408","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00561","scoring_system":"epss","scoring_elements":"0.68435","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00879","scoring_system":"epss","scoring_elements":"0.7529","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4559"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4559","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4559"},{"reference_url":"https://issues.chromium.org/issues/331369797","reference_id":"331369797","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-08T13:13:49Z/"}],"url":"https://issues.chromium.org/issues/331369797"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","reference_id":"6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-08T13:13:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","reference_id":"IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-08T13:13:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","reference_id":"LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-08T13:13:49Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"},{"reference_url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html","reference_id":"stable-channel-update-for-desktop_7.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-08T13:13:49Z/"}],"url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-4559"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g8mm-2jmc-zuh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59078?format=json","vulnerability_id":"VCID-h1qs-sdxq-fqg7","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1676","reference_id":"","reference_type":"","scores":[{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55463","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55551","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55555","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55456","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55476","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5545","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55401","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55447","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55504","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.5549","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55514","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55491","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55542","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55543","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55553","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00325","scoring_system":"epss","scoring_elements":"0.55532","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1676"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1676","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1676"},{"reference_url":"https://issues.chromium.org/issues/40944847","reference_id":"40944847","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-05T15:58:40Z/"}],"url":"https://issues.chromium.org/issues/40944847"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","reference_id":"PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-05T15:58:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","reference_id":"QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-05T15:58:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"},{"reference_url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","reference_id":"stable-channel-update-for-desktop_20.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-11-05T15:58:40Z/"}],"url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-1676"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-h1qs-sdxq-fqg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59103?format=json","vulnerability_id":"VCID-j736-y8am-xbah","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3832","reference_id":"","reference_type":"","scores":[{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87729","published_at":"2026-04-24T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87748","published_at":"2026-05-05T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87733","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03556","scoring_system":"epss","scoring_elements":"0.87734","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04728","scoring_system":"epss","scoring_elements":"0.8946","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04728","scoring_system":"epss","scoring_elements":"0.89503","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04728","scoring_system":"epss","scoring_elements":"0.89483","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04728","scoring_system":"epss","scoring_elements":"0.89473","published_at":"2026-05-11T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90461","published_at":"2026-04-09T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90425","published_at":"2026-04-02T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90437","published_at":"2026-04-04T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90441","published_at":"2026-04-07T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90455","published_at":"2026-04-08T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90468","published_at":"2026-04-11T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90469","published_at":"2026-04-12T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90462","published_at":"2026-04-13T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90477","published_at":"2026-04-16T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90476","published_at":"2026-04-18T12:55:00Z"},{"value":"0.05754","scoring_system":"epss","scoring_elements":"0.90474","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3832"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3832","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3832"},{"reference_url":"https://issues.chromium.org/issues/331358160","reference_id":"331358160","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T20:00:59Z/"}],"url":"https://issues.chromium.org/issues/331358160"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","reference_id":"CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T20:00:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","reference_id":"PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T20:00:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","reference_id":"stable-channel-update-for-desktop_16.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T20:00:59Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","reference_id":"WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-14T20:00:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-3832"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j736-y8am-xbah"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59105?format=json","vulnerability_id":"VCID-kcsu-b91y-t7g5","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3834","reference_id":"","reference_type":"","scores":[{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.6365","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63677","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63661","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63673","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.6369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.6368","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0045","scoring_system":"epss","scoring_elements":"0.63692","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00927","scoring_system":"epss","scoring_elements":"0.7614","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00927","scoring_system":"epss","scoring_elements":"0.7613","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00927","scoring_system":"epss","scoring_elements":"0.76119","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00927","scoring_system":"epss","scoring_elements":"0.76109","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79494","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79416","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79436","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01248","scoring_system":"epss","scoring_elements":"0.79455","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3834"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3834"},{"reference_url":"https://issues.chromium.org/issues/326607008","reference_id":"326607008","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:24:24Z/"}],"url":"https://issues.chromium.org/issues/326607008"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","reference_id":"CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:24:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","reference_id":"IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:24:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","reference_id":"M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:24:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","reference_id":"PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:24:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","reference_id":"stable-channel-update-for-desktop_16.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:24:24Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:24:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","reference_id":"WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T19:24:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-3834"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kcsu-b91y-t7g5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59072?format=json","vulnerability_id":"VCID-kk71-tdbb-yqgp","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1670","reference_id":"","reference_type":"","scores":[{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66982","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66857","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66871","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66867","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66838","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66881","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66921","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66895","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66917","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66767","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66792","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66764","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66828","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66848","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66834","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66802","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66835","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66849","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00519","scoring_system":"epss","scoring_elements":"0.66833","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1670"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1670","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1670"},{"reference_url":"https://issues.chromium.org/issues/41481374","reference_id":"41481374","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-21T16:10:10Z/"}],"url":"https://issues.chromium.org/issues/41481374"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","reference_id":"PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-21T16:10:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","reference_id":"QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-21T16:10:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"},{"reference_url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","reference_id":"stable-channel-update-for-desktop_20.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-21T16:10:10Z/"}],"url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-1670"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kk71-tdbb-yqgp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59093?format=json","vulnerability_id":"VCID-m5um-4e29-gfau","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2883","reference_id":"","reference_type":"","scores":[{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32207","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32139","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32117","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32209","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00131","scoring_system":"epss","scoring_elements":"0.32199","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37974","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37856","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38068","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39684","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40216","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.5345","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53476","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53445","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53496","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53493","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53525","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53508","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53543","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53549","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2883"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2883","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2883"},{"reference_url":"https://issues.chromium.org/issues/327807820","reference_id":"327807820","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-14T00:51:27Z/"}],"url":"https://issues.chromium.org/issues/327807820"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/","reference_id":"3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-14T00:51:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3YUWGSMA5X2NQP5XEFCLRWNX6246GZ2C/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/","reference_id":"G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-14T00:51:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G3RKI7VTQSIAI3PVZGRCHOSELTQXQ5FQ/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/","reference_id":"IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-14T00:51:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IQMRHKDEG4J7TMRRRGUGW6GS4MVBX5IT/"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html","reference_id":"stable-channel-update-for-desktop_26.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-03-14T00:51:27Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_26.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2883"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m5um-4e29-gfau"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59109?format=json","vulnerability_id":"VCID-rz47-7yc6-2ybw","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4331","reference_id":"","reference_type":"","scores":[{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78795","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78632","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78606","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78636","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78634","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.7863","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78661","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78669","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78686","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78704","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78727","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78743","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78739","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78756","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78563","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78595","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78576","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78602","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01163","scoring_system":"epss","scoring_elements":"0.78608","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4331"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4331","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4331"},{"reference_url":"https://issues.chromium.org/issues/335003891","reference_id":"335003891","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://issues.chromium.org/issues/335003891"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","reference_id":"6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","reference_id":"IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/","reference_id":"L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","reference_id":"LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html","reference_id":"stable-channel-update-for-desktop_30.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-4331"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rz47-7yc6-2ybw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59081?format=json","vulnerability_id":"VCID-s6qu-s7m7-xyer","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2174","reference_id":"","reference_type":"","scores":[{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32484","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32403","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32433","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32454","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32419","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32446","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32581","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32405","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.32453","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0013","scoring_system":"epss","scoring_elements":"0.3248","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40128","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40188","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40049","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40117","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40133","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40037","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40061","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40281","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40269","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2174"},{"reference_url":"https://issues.chromium.org/issues/325866363","reference_id":"325866363","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:27:11Z/"}],"url":"https://issues.chromium.org/issues/325866363"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/","reference_id":"OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:27:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OYEGSHTMXIPXD5OW5CXVWQS3ZUBCBSXG/"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-28T14:27:11Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2174"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s6qu-s7m7-xyer"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47471?format=json","vulnerability_id":"VCID-u1sp-38g8-xfan","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4558","reference_id":"","reference_type":"","scores":[{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85149","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85115","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.851","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.84992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85104","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85084","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85059","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85043","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85045","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85036","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85011","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85013","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.85014","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85544","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85524","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689","reference_id":"2279689","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689"},{"reference_url":"https://issues.chromium.org/issues/337766133","reference_id":"337766133","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://issues.chromium.org/issues/337766133"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","reference_id":"6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/","reference_id":"BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/","reference_id":"FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","reference_id":"IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","reference_id":"LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html","reference_id":"stable-channel-update-for-desktop_7.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-4558"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u1sp-38g8-xfan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59092?format=json","vulnerability_id":"VCID-uhn4-egfc-ebda","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2628","reference_id":"","reference_type":"","scores":[{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39639","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39626","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.3962","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39657","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39648","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39633","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39579","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39662","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.5434","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54231","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54286","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54246","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00311","scoring_system":"epss","scoring_elements":"0.54272","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55014","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.54958","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55007","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0032","scoring_system":"epss","scoring_elements":"0.55034","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2628"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","reference_id":"2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T18:00:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/"},{"reference_url":"https://issues.chromium.org/issues/41487774","reference_id":"41487774","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T18:00:59Z/"}],"url":"https://issues.chromium.org/issues/41487774"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","reference_id":"6JINDYFB3MPH43ECTI72BV63K4RXSG22","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T18:00:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","reference_id":"AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T18:00:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","reference_id":"stable-channel-update-for-desktop_19.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-17T18:00:59Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2628"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-uhn4-egfc-ebda"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59084?format=json","vulnerability_id":"VCID-ursd-c1rf-tyeq","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2400","reference_id":"","reference_type":"","scores":[{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34738","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34866","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34848","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34759","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34632","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34704","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34742","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34645","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.34671","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.352","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35228","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35109","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35153","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35179","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35183","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35148","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35161","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35147","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.35099","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2400"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2400","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2400"},{"reference_url":"https://issues.chromium.org/issues/327696052","reference_id":"327696052","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-12T18:14:17Z/"}],"url":"https://issues.chromium.org/issues/327696052"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_12.html","reference_id":"stable-channel-update-for-desktop_12.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-12T18:14:17Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_12.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T55OZ7JOMLNT5ICM4DTCZOJZD6TZICKO/","reference_id":"T55OZ7JOMLNT5ICM4DTCZOJZD6TZICKO","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-12T18:14:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T55OZ7JOMLNT5ICM4DTCZOJZD6TZICKO/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIKPDCUMQNF2DFB7TU3V4ISJ7WFJH7YI/","reference_id":"VIKPDCUMQNF2DFB7TU3V4ISJ7WFJH7YI","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-12T18:14:17Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VIKPDCUMQNF2DFB7TU3V4ISJ7WFJH7YI/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2400"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ursd-c1rf-tyeq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59077?format=json","vulnerability_id":"VCID-v6qa-35bx-73gs","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1675","reference_id":"","reference_type":"","scores":[{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28733","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2878","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34416","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34548","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34528","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34441","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34316","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34386","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34426","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34321","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34348","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34837","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34865","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3487","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34832","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34808","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34846","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.3483","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00145","scoring_system":"epss","scoring_elements":"0.34785","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1675"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1675","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1675"},{"reference_url":"https://issues.chromium.org/issues/41486208","reference_id":"41486208","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T20:02:40Z/"}],"url":"https://issues.chromium.org/issues/41486208"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/","reference_id":"PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T20:02:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/","reference_id":"QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T20:02:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/"},{"reference_url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html","reference_id":"stable-channel-update-for-desktop_20.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-08-07T20:02:40Z/"}],"url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-1675"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v6qa-35bx-73gs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47470?format=json","vulnerability_id":"VCID-xb38-zgjp-gygu","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4060","reference_id":"","reference_type":"","scores":[{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44299","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44298","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44171","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44249","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44265","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.442","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4423","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44475","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44497","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44434","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44486","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44492","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44508","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44479","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4448","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44536","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44527","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44375","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44379","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4060"},{"reference_url":"https://issues.chromium.org/issues/333420620","reference_id":"333420620","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-01T14:49:26Z/"}],"url":"https://issues.chromium.org/issues/333420620"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html","reference_id":"stable-channel-update-for-desktop_24.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-01T14:49:26Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-01T14:49:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-4060"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xb38-zgjp-gygu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59104?format=json","vulnerability_id":"VCID-xtcv-nv3g-nkfr","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3833","reference_id":"","reference_type":"","scores":[{"value":"0.02281","scoring_system":"epss","scoring_elements":"0.84729","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02281","scoring_system":"epss","scoring_elements":"0.84754","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02281","scoring_system":"epss","scoring_elements":"0.84739","published_at":"2026-04-29T12:55:00Z"},{"value":"0.03051","scoring_system":"epss","scoring_elements":"0.86786","published_at":"2026-05-11T12:55:00Z"},{"value":"0.03051","scoring_system":"epss","scoring_elements":"0.86791","published_at":"2026-05-09T12:55:00Z"},{"value":"0.03051","scoring_system":"epss","scoring_elements":"0.86774","published_at":"2026-05-07T12:55:00Z"},{"value":"0.03051","scoring_system":"epss","scoring_elements":"0.86829","published_at":"2026-05-14T12:55:00Z"},{"value":"0.03051","scoring_system":"epss","scoring_elements":"0.86798","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04149","scoring_system":"epss","scoring_elements":"0.88637","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04149","scoring_system":"epss","scoring_elements":"0.88621","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04149","scoring_system":"epss","scoring_elements":"0.88638","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04149","scoring_system":"epss","scoring_elements":"0.88656","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04149","scoring_system":"epss","scoring_elements":"0.88661","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04149","scoring_system":"epss","scoring_elements":"0.88673","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04149","scoring_system":"epss","scoring_elements":"0.88666","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04149","scoring_system":"epss","scoring_elements":"0.8868","published_at":"2026-04-16T12:55:00Z"},{"value":"0.04149","scoring_system":"epss","scoring_elements":"0.88676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04149","scoring_system":"epss","scoring_elements":"0.88675","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-3833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3833"},{"reference_url":"https://issues.chromium.org/issues/331383939","reference_id":"331383939","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-28T03:55:29Z/"}],"url":"https://issues.chromium.org/issues/331383939"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/","reference_id":"CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-28T03:55:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/","reference_id":"IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-28T03:55:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/","reference_id":"M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-28T03:55:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/","reference_id":"PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-28T03:55:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html","reference_id":"stable-channel-update-for-desktop_16.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-28T03:55:29Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-28T03:55:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/","reference_id":"WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track*","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-06-28T03:55:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-3833"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xtcv-nv3g-nkfr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59089?format=json","vulnerability_id":"VCID-ya5r-nz1z-23gw","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2626","reference_id":"","reference_type":"","scores":[{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32024","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31912","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31899","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31933","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31972","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31969","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.3194","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31888","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.32065","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35444","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35821","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35425","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35447","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35352","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35376","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36133","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.35896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36016","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00156","scoring_system":"epss","scoring_elements":"0.36103","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-2626"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2626","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2626"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/","reference_id":"2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T16:27:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D3Z6CRRN4J3IUZPJZVURGMRBN6WFPTU/"},{"reference_url":"https://issues.chromium.org/issues/40945098","reference_id":"40945098","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T16:27:53Z/"}],"url":"https://issues.chromium.org/issues/40945098"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/","reference_id":"6JINDYFB3MPH43ECTI72BV63K4RXSG22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T16:27:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6JINDYFB3MPH43ECTI72BV63K4RXSG22/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/","reference_id":"AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T16:27:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AQVVW4FLQDIJ2UABGXK2SMS5AUGT54FM/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html","reference_id":"stable-channel-update-for-desktop_19.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T16:27:53Z/"}],"url":"https://chromereleases.googleblog.com/2024/03/stable-channel-update-for-desktop_19.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-2626"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ya5r-nz1z-23gw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/59110?format=json","vulnerability_id":"VCID-ytxj-r5kb-euf9","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4368","reference_id":"","reference_type":"","scores":[{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62426","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62296","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62315","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62305","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62283","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62329","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62336","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6232","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62328","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62345","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.6234","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62286","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62335","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62393","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62372","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62231","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62261","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00426","scoring_system":"epss","scoring_elements":"0.62279","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4368"},{"reference_url":"https://issues.chromium.org/issues/333508731","reference_id":"333508731","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://issues.chromium.org/issues/333508731"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","reference_id":"6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","reference_id":"IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/","reference_id":"L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7I4FMQSOVTCIIH4XT2MJGEQRUACLPB6/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","reference_id":"LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"},{"reference_url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html","reference_id":"stable-channel-update-for-desktop_30.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_30.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/","reference_id":"UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-04T04:00:10Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/84457?format=json","purl":"pkg:ebuild/www-client/opera@110.0.5130.35","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@110.0.5130.35"},{"url":"http://public2.vulnerablecode.io/api/packages/84458?format=json","purl":"pkg:ebuild/www-client/opera@124.0.2478.97","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"},{"url":"http://public2.vulnerablecode.io/api/packages/84459?format=json","purl":"pkg:ebuild/www-client/opera@124.0.6367.155","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.6367.155"}],"aliases":["CVE-2024-4368"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ytxj-r5kb-euf9"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/www-client/opera@124.0.2478.97"}