[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-DEBIAN-CVE-2024-4558":6},{"stargazers_count":4,"fetched_at":5},5,"2026-04-08T08:11:26.341Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":11,"aliases":12,"duplicate_of":9,"upstream":13,"downstream":16,"duplicates":23,"related":24,"reserved_at":9,"published_at":25,"modified_at":26,"state":9,"summary":27,"references_raw":29,"kevs":36,"epss":9,"epss_history":37,"metrics":38,"affected":45},"DEBIAN-CVE-2024-4558","Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)",null,[],[],[],[14],{"_key":15},"CVE-2024-4558",[17,19,21],{"_key":18},"DLA-3864-1",{"_key":20},"DSA-5683-1",{"_key":22},"DSA-5762-1",[],[],"2024-05-07T19:15:08.577Z","2026-03-17T02:45:51.719291Z",{"cisa_kev":28,"cisa_ransomware":28,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":9,"severity_score":9,"severity_version":9,"severity_source":9,"severity_vector":9,"severity_status":9},false,[30],{"url":31,"sources":32,"tags":34},"https://security-tracker.debian.org/tracker/CVE-2024-4558",[33],"osv_debian",[35],"Advisory",[],[],[39],{"source":33,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":40,"cvss_v4_0":9},{"baseScore":41,"baseSeverity":9,"vectorString":42,"impactScore":43,"exploitabilityScore":44},9.6,"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",10,7.2,[46,64,77],{"ecosystem":47,"name":48,"vendor":49,"product":48,"cpe_part":9,"purl_type":50,"purl_namespace":49,"purl_name":48,"source":9,"versions":51},"Debian","chromium","debian","deb",[52,56,60,63],{"version":53,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},"all",true,"ecosystem",{"version":57,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":58,"version_end_type":59,"fixed_in":9},"lt124_0_6367_155_1~deb12u1","124.0.6367.155-1~deb12u1","excluding",{"version":61,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":62,"version_end_type":59,"fixed_in":9},"lt124_0_6367_155_1","124.0.6367.155-1",{"version":61,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":62,"version_end_type":59,"fixed_in":9},{"ecosystem":47,"name":65,"vendor":49,"product":65,"cpe_part":9,"purl_type":50,"purl_namespace":49,"purl_name":65,"source":9,"versions":66},"webkit2gtk",[67,70,73,76],{"version":68,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":69,"version_end_type":59,"fixed_in":9},"lt2_44_3_1~deb11u1","2.44.3-1~deb11u1",{"version":71,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":72,"version_end_type":59,"fixed_in":9},"lt2_44_3_1~deb12u1","2.44.3-1~deb12u1",{"version":74,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":75,"version_end_type":59,"fixed_in":9},"lt2_44_3_1","2.44.3-1",{"version":74,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":75,"version_end_type":59,"fixed_in":9},{"ecosystem":47,"name":78,"vendor":49,"product":78,"cpe_part":9,"purl_type":50,"purl_namespace":49,"purl_name":78,"source":9,"versions":79},"wpewebkit",[80,81,82,83],{"version":53,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},{"version":53,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":9,"version_end_type":9,"fixed_in":9},{"version":74,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":75,"version_end_type":59,"fixed_in":9},{"version":74,"is_range":54,"range_type":55,"version_start":9,"version_start_type":9,"version_end":75,"version_end_type":59,"fixed_in":9}]