{"url":"http://public2.vulnerablecode.io/api/packages/957601?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=x86&distroversion=v3.19&reponame=community","type":"apk","namespace":"alpine","name":"qt6-qtwebengine","version":"6.6.1-r3","qualifiers":{"arch":"x86","distroversion":"v3.19","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"6.6.1-r4","latest_non_vulnerable_version":"6.6.1-r12","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31544?format=json","vulnerability_id":"VCID-9czp-wct7-8qa7","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6703","reference_id":"","reference_type":"","scores":[{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.5659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.5662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56624","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56609","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56618","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56523","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56478","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707"},{"reference_url":"https://security.gentoo.org/glsa/202402-14","reference_id":"GLSA-202402-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-14"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/957601?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=x86&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3%3Farch=x86&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2023-6703"],"risk_score":null,"exploitability":"0.5","weighted_severity":"0.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9czp-wct7-8qa7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31547?format=json","vulnerability_id":"VCID-k3n7-zdsw-eyg6","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6706","reference_id":"","reference_type":"","scores":[{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56478","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56569","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56609","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56587","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56618","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56617","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56588","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56523","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56541","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.5659","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56568","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.5662","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00337","scoring_system":"epss","scoring_elements":"0.56624","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707"},{"reference_url":"https://crbug.com/1500921","reference_id":"1500921","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/"}],"url":"https://crbug.com/1500921"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/","reference_id":"6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/"},{"reference_url":"https://security.gentoo.org/glsa/202402-14","reference_id":"GLSA-202402-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-14"},{"reference_url":"https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html","reference_id":"stable-channel-update-for-desktop_12.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/"}],"url":"https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/957601?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=x86&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3%3Farch=x86&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2023-6706"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k3n7-zdsw-eyg6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31546?format=json","vulnerability_id":"VCID-x8dh-sm6j-n7gd","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6705","reference_id":"","reference_type":"","scores":[{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5792","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57966","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58014","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57994","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58024","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58023","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57964","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.5798","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57963","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57985","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.57961","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58017","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58019","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00357","scoring_system":"epss","scoring_elements":"0.58036","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707"},{"reference_url":"https://crbug.com/1505708","reference_id":"1505708","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/"}],"url":"https://crbug.com/1505708"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/","reference_id":"6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/"},{"reference_url":"https://security.gentoo.org/glsa/202402-14","reference_id":"GLSA-202402-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-14"},{"reference_url":"https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html","reference_id":"stable-channel-update-for-desktop_12.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/"}],"url":"https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/957601?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=x86&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3%3Farch=x86&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2023-6705"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x8dh-sm6j-n7gd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/31543?format=json","vulnerability_id":"VCID-y2u9-49qt-a3e6","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6702","reference_id":"","reference_type":"","scores":[{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97915","published_at":"2026-05-05T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97882","published_at":"2026-04-02T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97897","published_at":"2026-04-11T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97898","published_at":"2026-04-12T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97899","published_at":"2026-04-13T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97906","published_at":"2026-04-21T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97907","published_at":"2026-04-18T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97904","published_at":"2026-04-24T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97905","published_at":"2026-04-26T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97911","published_at":"2026-04-29T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97883","published_at":"2026-04-04T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97887","published_at":"2026-04-07T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97891","published_at":"2026-04-08T12:55:00Z"},{"value":"0.51688","scoring_system":"epss","scoring_elements":"0.97894","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-6702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707"},{"reference_url":"https://crbug.com/1501326","reference_id":"1501326","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/"}],"url":"https://crbug.com/1501326"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/","reference_id":"6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/"},{"reference_url":"https://security.gentoo.org/glsa/202402-14","reference_id":"GLSA-202402-14","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202402-14"},{"reference_url":"https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html","reference_id":"stable-channel-update-for-desktop_12.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/"}],"url":"https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/957601?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=x86&distroversion=v3.19&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3%3Farch=x86&distroversion=v3.19&reponame=community"}],"aliases":["CVE-2023-6702"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y2u9-49qt-a3e6"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3%3Farch=x86&distroversion=v3.19&reponame=community"}