{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","type":"ebuild","namespace":"dev-qt","name":"qtwebengine","version":"5.15.13_p20240322","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"5.15.16_p20241115","latest_non_vulnerable_version":"5.15.16_p20241115","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51268?format=json","vulnerability_id":"VCID-1yhp-44rg-fygc","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0806","reference_id":"","reference_type":"","scores":[{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49315","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49388","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.49318","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4929","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0026","scoring_system":"epss","scoring_elements":"0.4934","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.5586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.559","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55801","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.5582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55795","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55736","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55834","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55885","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55897","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0806"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0806","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0806"},{"reference_url":"https://crbug.com/1505176","reference_id":"1505176","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-24T14:34:59Z/"}],"url":"https://crbug.com/1505176"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-24T14:34:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-24T14:34:59Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-24T14:34:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0806"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1yhp-44rg-fygc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47245?format=json","vulnerability_id":"VCID-2taa-wgtc-73e9","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1284","reference_id":"","reference_type":"","scores":[{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76793","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76663","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76667","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76655","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76687","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76693","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76706","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76724","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76742","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76729","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76746","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76581","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76613","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76651","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.7663","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0097","scoring_system":"epss","scoring_elements":"0.76621","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76889","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00996","scoring_system":"epss","scoring_elements":"0.76919","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1284"},{"reference_url":"https://issues.chromium.org/issues/41494539","reference_id":"41494539","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:33:53Z/"}],"url":"https://issues.chromium.org/issues/41494539"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://security.gentoo.org/glsa/202507-07","reference_id":"GLSA-202507-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202507-07"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/","reference_id":"KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:33:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/"},{"reference_url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:33:53Z/"}],"url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/","reference_id":"WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:33:53Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-1284"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2taa-wgtc-73e9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51271?format=json","vulnerability_id":"VCID-4g2e-nypz-j3cb","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0809","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12477","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12417","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12384","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12271","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12187","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12322","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12386","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1238","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12405","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12534","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12342","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12422","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12473","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1248","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12442","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12402","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12302","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12414","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0809"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0809","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0809"},{"reference_url":"https://crbug.com/1497985","reference_id":"1497985","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:39:59Z/"}],"url":"https://crbug.com/1497985"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:39:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:39:59Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:39:59Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0809"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4g2e-nypz-j3cb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51276?format=json","vulnerability_id":"VCID-7xpc-b6br-67eq","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0813","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.1856","published_at":"2026-05-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18754","published_at":"2026-05-14T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18656","published_at":"2026-05-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18625","published_at":"2026-05-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18662","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22821","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22765","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22779","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22773","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22732","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2257","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22562","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22463","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22873","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22918","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.2271","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22786","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22838","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22858","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0813"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0813","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0813"},{"reference_url":"https://crbug.com/1477151","reference_id":"1477151","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T14:32:54Z/"}],"url":"https://crbug.com/1477151"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T14:32:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T14:32:54Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T14:32:54Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0813"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7xpc-b6br-67eq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51273?format=json","vulnerability_id":"VCID-aav8-akje-f7d5","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0810","reference_id":"","reference_type":"","scores":[{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21979","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.2187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21859","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21845","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21753","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21826","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21903","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21874","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.21897","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22182","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22231","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22013","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22094","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22167","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22126","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22067","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22066","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22059","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00073","scoring_system":"epss","scoring_elements":"0.22012","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0810"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0810","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0810"},{"reference_url":"https://crbug.com/1496250","reference_id":"1496250","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T15:36:11Z/"}],"url":"https://crbug.com/1496250"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T15:36:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T15:36:11Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T15:36:11Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0810"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aav8-akje-f7d5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51282?format=json","vulnerability_id":"VCID-apvk-3qxe-23ga","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1060","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51377","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57738","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57702","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5766","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57679","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57658","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57612","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.5772","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57667","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57695","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57668","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57689","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57665","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57719","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57722","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57717","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57697","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57727","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00353","scoring_system":"epss","scoring_elements":"0.57724","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1060"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1060","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1060"},{"reference_url":"https://crbug.com/1511567","reference_id":"1511567","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T20:28:29Z/"}],"url":"https://crbug.com/1511567"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/","reference_id":"NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T20:28:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html","reference_id":"stable-channel-update-for-desktop_30.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T20:28:29Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/","reference_id":"XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T20:28:29Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-1060"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apvk-3qxe-23ga"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51269?format=json","vulnerability_id":"VCID-cauw-99m8-xygg","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0807","reference_id":"","reference_type":"","scores":[{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41866","published_at":"2026-05-07T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41898","published_at":"2026-05-14T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41823","published_at":"2026-05-12T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41799","published_at":"2026-05-11T12:55:00Z"},{"value":"0.002","scoring_system":"epss","scoring_elements":"0.41884","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48657","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48649","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48661","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4871","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48706","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48662","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48647","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48522","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48632","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48653","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.48606","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00253","scoring_system":"epss","scoring_elements":"0.4866","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0807"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0807","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0807"},{"reference_url":"https://crbug.com/1505080","reference_id":"1505080","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:18Z/"}],"url":"https://crbug.com/1505080"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:18Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:18Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0807"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-cauw-99m8-xygg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51275?format=json","vulnerability_id":"VCID-fsrh-9pjx-1bgs","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0812","reference_id":"","reference_type":"","scores":[{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55882","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55801","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.5582","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55795","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55736","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55783","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.5584","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55822","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55833","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55855","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55834","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55885","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55888","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55878","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.5586","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.55895","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00329","scoring_system":"epss","scoring_elements":"0.559","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0812"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0812","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0812"},{"reference_url":"https://crbug.com/1484394","reference_id":"1484394","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T20:28:33Z/"}],"url":"https://crbug.com/1484394"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T20:28:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T20:28:33Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-08T20:28:33Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0812"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fsrh-9pjx-1bgs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51274?format=json","vulnerability_id":"VCID-fzgh-mk5w-8ubx","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0811","reference_id":"","reference_type":"","scores":[{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56585","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56567","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56658","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56659","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56628","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56649","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56609","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5663","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.5666","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56665","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00338","scoring_system":"epss","scoring_elements":"0.56519","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58497","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58387","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58446","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58401","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00363","scoring_system":"epss","scoring_elements":"0.58429","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0811"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0811","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0811"},{"reference_url":"https://crbug.com/1494490","reference_id":"1494490","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T18:31:12Z/"}],"url":"https://crbug.com/1494490"},{"reference_url":"http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html","reference_id":"Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T18:31:12Z/"}],"url":"http://packetstormsecurity.com/files/177172/Chrome-chrome.pageCapture.saveAsMHTML-Extension-API-Blocked-Origin-Bypass.html"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T18:31:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T18:31:12Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-16T18:31:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0811"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fzgh-mk5w-8ubx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51267?format=json","vulnerability_id":"VCID-g1nu-japp-wbec","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0805","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32488","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3301","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32827","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32713","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3263","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3249","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32554","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32563","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32466","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33111","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33144","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32973","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33019","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33049","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33053","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33015","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3299","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33032","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0805"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0805","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0805"},{"reference_url":"https://crbug.com/1514925","reference_id":"1514925","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T16:32:45Z/"}],"url":"https://crbug.com/1514925"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T16:32:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T16:32:45Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-01-24T16:32:45Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0805"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-g1nu-japp-wbec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51283?format=json","vulnerability_id":"VCID-ge6a-3w19-d7ba","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1077","reference_id":"","reference_type":"","scores":[{"value":"0.00794","scoring_system":"epss","scoring_elements":"0.74102","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77001","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77066","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77072","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77087","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77096","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77125","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77146","published_at":"2026-05-09T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77134","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77151","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76939","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76969","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76951","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76983","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76994","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.76996","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77036","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77038","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01001","scoring_system":"epss","scoring_elements":"0.77031","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1077"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1077","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1077"},{"reference_url":"https://crbug.com/1511085","reference_id":"1511085","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-13T05:00:24Z/"}],"url":"https://crbug.com/1511085"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/","reference_id":"NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-13T05:00:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html","reference_id":"stable-channel-update-for-desktop_30.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-13T05:00:24Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/","reference_id":"XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-13T05:00:24Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-1077"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ge6a-3w19-d7ba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47244?format=json","vulnerability_id":"VCID-n4j3-th65-kyhu","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1283","reference_id":"","reference_type":"","scores":[{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.86006","published_at":"2026-05-14T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85892","published_at":"2026-04-24T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.859","published_at":"2026-04-26T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85901","published_at":"2026-04-29T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.8592","published_at":"2026-05-05T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85942","published_at":"2026-05-07T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85959","published_at":"2026-05-09T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85958","published_at":"2026-05-11T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85971","published_at":"2026-05-12T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85795","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85813","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85818","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85836","published_at":"2026-04-08T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85846","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85861","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85859","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85873","published_at":"2026-04-16T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.85877","published_at":"2026-04-18T12:55:00Z"},{"value":"0.02686","scoring_system":"epss","scoring_elements":"0.8587","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1283"},{"reference_url":"https://issues.chromium.org/issues/41494860","reference_id":"41494860","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:56:43Z/"}],"url":"https://issues.chromium.org/issues/41494860"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://security.gentoo.org/glsa/202507-07","reference_id":"GLSA-202507-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202507-07"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/","reference_id":"KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:56:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KN32XXNHIR6KBS4BYQTZV2JQFN4D6ZSE/"},{"reference_url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:56:43Z/"}],"url":"https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/","reference_id":"WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-17T14:56:43Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WSCIL2WH2L4R4KWSRCTDWBPAMOJIYBJE/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-1283"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n4j3-th65-kyhu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51278?format=json","vulnerability_id":"VCID-qb3b-usf4-kfbr","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0814","reference_id":"","reference_type":"","scores":[{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3179","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32062","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31936","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31855","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31709","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31783","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31791","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.31697","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3172","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32367","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32229","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32277","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32307","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32308","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.3227","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32238","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32274","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32253","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00129","scoring_system":"epss","scoring_elements":"0.32224","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0814"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0814","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0814"},{"reference_url":"https://crbug.com/1463935","reference_id":"1463935","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:12Z/"}],"url":"https://crbug.com/1463935"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:12Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-08T17:35:12Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0814"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qb3b-usf4-kfbr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51280?format=json","vulnerability_id":"VCID-rt4q-wt24-s3bb","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1059","reference_id":"","reference_type":"","scores":[{"value":"0.00553","scoring_system":"epss","scoring_elements":"0.68239","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71966","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72026","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72034","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72028","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72021","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72054","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72085","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72048","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.72076","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71913","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71932","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71908","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71947","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71959","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71983","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71949","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.7199","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71997","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00698","scoring_system":"epss","scoring_elements":"0.71982","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-1059"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1059","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1059"},{"reference_url":"https://crbug.com/1514777","reference_id":"1514777","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-13T05:00:34Z/"}],"url":"https://crbug.com/1514777"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/","reference_id":"NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-13T05:00:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NEUXJY3YC3VGIJW2AOHL4NZ7ZK7BRYWY/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html","reference_id":"stable-channel-update-for-desktop_30.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-13T05:00:34Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_30.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/","reference_id":"XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-13T05:00:34Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XCVKRHRWPMITSVFBHQBSNXOVJAKT547Q/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-1059"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rt4q-wt24-s3bb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51266?format=json","vulnerability_id":"VCID-x1y6-a4rp-9fg2","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0804","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29468","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2969","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29576","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29513","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29371","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29435","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29447","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29368","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29389","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29948","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29997","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.2981","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29872","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29908","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29914","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29868","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29819","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29837","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29817","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29769","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0804"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0804","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0804"},{"reference_url":"https://crbug.com/1515137","reference_id":"1515137","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-14T19:35:36Z/"}],"url":"https://crbug.com/1515137"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-14T19:35:36Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-14T19:35:36Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-05-14T19:35:36Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0804"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x1y6-a4rp-9fg2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/51270?format=json","vulnerability_id":"VCID-znf7-1xx4-8yf1","summary":"Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0808","reference_id":"","reference_type":"","scores":[{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57077","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56982","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57001","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56983","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56932","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56979","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.5704","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.56991","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57015","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57029","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57028","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57079","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.5708","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57092","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57071","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57047","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57075","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57072","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00344","scoring_system":"epss","scoring_elements":"0.57049","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-0808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0808"},{"reference_url":"https://crbug.com/1504936","reference_id":"1504936","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:34:13Z/"}],"url":"https://crbug.com/1504936"},{"reference_url":"https://security.gentoo.org/glsa/202402-23","reference_id":"GLSA-202402-23","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-23"},{"reference_url":"https://security.gentoo.org/glsa/202405-14","reference_id":"GLSA-202405-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202405-14"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/","reference_id":"MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:34:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MMI6GXFONZV6HE3BPZO3AP6GUVQLG4JQ/"},{"reference_url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html","reference_id":"stable-channel-update-for-desktop_23.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:34:13Z/"}],"url":"https://chromereleases.googleblog.com/2024/01/stable-channel-update-for-desktop_23.html"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/","reference_id":"VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-09T23:34:13Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VXDSGAFQD4BDB4IB2O4ZUSHC3JCVQEKC/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85595?format=json","purl":"pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}],"aliases":["CVE-2024-0808"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-znf7-1xx4-8yf1"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/dev-qt/qtwebengine@5.15.13_p20240322"}