Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Nameqt5-qtwebengine
Version5.15.17-r10
Qualifiers
arch ppc64le
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4dke-ryut-ebhg
vulnerability_id VCID-4dke-ryut-ebhg
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0436
reference_id
reference_type
scores
0
value 0.00509
scoring_system epss
scoring_elements 0.6639
published_at 2026-04-16T12:55:00Z
1
value 0.00509
scoring_system epss
scoring_elements 0.66399
published_at 2026-04-11T12:55:00Z
2
value 0.00509
scoring_system epss
scoring_elements 0.66385
published_at 2026-04-12T12:55:00Z
3
value 0.00509
scoring_system epss
scoring_elements 0.66354
published_at 2026-04-13T12:55:00Z
4
value 0.00509
scoring_system epss
scoring_elements 0.66319
published_at 2026-04-02T12:55:00Z
5
value 0.00509
scoring_system epss
scoring_elements 0.66347
published_at 2026-04-04T12:55:00Z
6
value 0.00509
scoring_system epss
scoring_elements 0.66317
published_at 2026-04-07T12:55:00Z
7
value 0.00509
scoring_system epss
scoring_elements 0.66364
published_at 2026-04-08T12:55:00Z
8
value 0.00509
scoring_system epss
scoring_elements 0.66378
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0436
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0436
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0436
2
reference_url https://issues.chromium.org/issues/382786791
reference_id 382786791
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-15T14:49:46Z/
url https://issues.chromium.org/issues/382786791
3
reference_url https://security.gentoo.org/glsa/202507-07
reference_id GLSA-202507-07
reference_type
scores
url https://security.gentoo.org/glsa/202507-07
4
reference_url https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-15T14:49:46Z/
url https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-0436
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4dke-ryut-ebhg
1
url VCID-5wu4-dfd3-wkh2
vulnerability_id VCID-5wu4-dfd3-wkh2
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0762
reference_id
reference_type
scores
0
value 0.00373
scoring_system epss
scoring_elements 0.59034
published_at 2026-04-16T12:55:00Z
1
value 0.00373
scoring_system epss
scoring_elements 0.59036
published_at 2026-04-11T12:55:00Z
2
value 0.00373
scoring_system epss
scoring_elements 0.59018
published_at 2026-04-12T12:55:00Z
3
value 0.00373
scoring_system epss
scoring_elements 0.58999
published_at 2026-04-13T12:55:00Z
4
value 0.00373
scoring_system epss
scoring_elements 0.58971
published_at 2026-04-02T12:55:00Z
5
value 0.00373
scoring_system epss
scoring_elements 0.58993
published_at 2026-04-04T12:55:00Z
6
value 0.00373
scoring_system epss
scoring_elements 0.58959
published_at 2026-04-07T12:55:00Z
7
value 0.00373
scoring_system epss
scoring_elements 0.59011
published_at 2026-04-08T12:55:00Z
8
value 0.00373
scoring_system epss
scoring_elements 0.59017
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0762
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0762
2
reference_url https://issues.chromium.org/issues/384844003
reference_id 384844003
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T14:20:02Z/
url https://issues.chromium.org/issues/384844003
3
reference_url https://security.gentoo.org/glsa/202507-07
reference_id GLSA-202507-07
reference_type
scores
url https://security.gentoo.org/glsa/202507-07
4
reference_url https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_28.html
reference_id stable-channel-update-for-desktop_28.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T14:20:02Z/
url https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_28.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-0762
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5wu4-dfd3-wkh2
2
url VCID-azef-hxum-z3eb
vulnerability_id VCID-azef-hxum-z3eb
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23755
published_at 2026-04-04T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23536
published_at 2026-04-07T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24902
published_at 2026-04-16T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-08T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24969
published_at 2026-04-09T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-11T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24943
published_at 2026-04-12T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24888
published_at 2026-04-13T12:55:00Z
8
value 0.00098
scoring_system epss
scoring_elements 0.27125
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122281
reference_id 122281
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122281
5
reference_url https://support.apple.com/en-us/122283
reference_id 122283
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122283
6
reference_url https://support.apple.com/en-us/122284
reference_id 122284
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122284
7
reference_url https://support.apple.com/en-us/122285
reference_id 122285
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122285
8
reference_url https://support.apple.com/en-us/122345
reference_id 122345
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122345
9
reference_url https://support.apple.com/en-us/122346
reference_id 122346
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122346
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122372
11
reference_url https://support.apple.com/en-us/122376
reference_id 122376
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122376
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
reference_id 2351802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
13
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://access.redhat.com/errata/RHSA-2025:2863
reference_id RHSA-2025:2863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2863
16
reference_url https://access.redhat.com/errata/RHSA-2025:2864
reference_id RHSA-2025:2864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2864
17
reference_url https://access.redhat.com/errata/RHSA-2025:2997
reference_id RHSA-2025:2997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2997
18
reference_url https://access.redhat.com/errata/RHSA-2025:2998
reference_id RHSA-2025:2998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2998
19
reference_url https://access.redhat.com/errata/RHSA-2025:3000
reference_id RHSA-2025:3000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3000
20
reference_url https://access.redhat.com/errata/RHSA-2025:3001
reference_id RHSA-2025:3001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3001
21
reference_url https://access.redhat.com/errata/RHSA-2025:3002
reference_id RHSA-2025:3002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3002
22
reference_url https://access.redhat.com/errata/RHSA-2025:3005
reference_id RHSA-2025:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3005
23
reference_url https://access.redhat.com/errata/RHSA-2025:3034
reference_id RHSA-2025:3034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3034
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-24201
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azef-hxum-z3eb
3
url VCID-bzcx-rxg3-aygs
vulnerability_id VCID-bzcx-rxg3-aygs
summary
7-Zip Zstandard Decompression Integer Underflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of 7-Zip. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the implementation of Zstandard decompression. The issue results from the lack of proper validation of user-supplied data, which can result in an integer underflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24346.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-11477
reference_id
reference_type
scores
0
value 0.38072
scoring_system epss
scoring_elements 0.97213
published_at 2026-04-09T12:55:00Z
1
value 0.38072
scoring_system epss
scoring_elements 0.97217
published_at 2026-04-12T12:55:00Z
2
value 0.38072
scoring_system epss
scoring_elements 0.97216
published_at 2026-04-11T12:55:00Z
3
value 0.38072
scoring_system epss
scoring_elements 0.97195
published_at 2026-04-02T12:55:00Z
4
value 0.38072
scoring_system epss
scoring_elements 0.97201
published_at 2026-04-04T12:55:00Z
5
value 0.38072
scoring_system epss
scoring_elements 0.97202
published_at 2026-04-07T12:55:00Z
6
value 0.38072
scoring_system epss
scoring_elements 0.97211
published_at 2026-04-08T12:55:00Z
7
value 0.43636
scoring_system epss
scoring_elements 0.97529
published_at 2026-04-16T12:55:00Z
8
value 0.43636
scoring_system epss
scoring_elements 0.97521
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-11477
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://www.zerodayinitiative.com/advisories/ZDI-24-1532/
reference_id ZDI-24-1532
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track*
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:T/P:M/B:A/M:M/D:R/2024-11-30T04:55:53Z/
url https://www.zerodayinitiative.com/advisories/ZDI-24-1532/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2024-11477
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bzcx-rxg3-aygs
4
url VCID-gdn6-smyz-j3fm
vulnerability_id VCID-gdn6-smyz-j3fm
summary Heap buffer overflow in Codecs in Google Chrome on Windows prior to 135.0.7049.95 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-3619
reference_id
reference_type
scores
0
value 0.00121
scoring_system epss
scoring_elements 0.31107
published_at 2026-04-16T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31163
published_at 2026-04-11T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.31119
published_at 2026-04-12T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.31075
published_at 2026-04-13T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31209
published_at 2026-04-02T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.31251
published_at 2026-04-04T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.31072
published_at 2026-04-07T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31125
published_at 2026-04-08T12:55:00Z
8
value 0.00121
scoring_system epss
scoring_elements 0.31155
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-3619
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3619
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3619
2
reference_url https://issues.chromium.org/issues/409619251
reference_id 409619251
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-17T13:38:46Z/
url https://issues.chromium.org/issues/409619251
3
reference_url https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-17T13:38:46Z/
url https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_15.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-3619
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gdn6-smyz-j3fm
5
url VCID-j9bt-u7v1-mkgt
vulnerability_id VCID-j9bt-u7v1-mkgt
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-2136
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.43125
published_at 2026-04-16T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43115
published_at 2026-04-11T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43081
published_at 2026-04-12T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43066
published_at 2026-04-13T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.4306
published_at 2026-04-02T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43088
published_at 2026-04-04T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43027
published_at 2026-04-07T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.4308
published_at 2026-04-08T12:55:00Z
8
value 0.00207
scoring_system epss
scoring_elements 0.43092
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-2136
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2136
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2136
2
reference_url https://issues.chromium.org/issues/395032416
reference_id 395032416
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-12T04:00:34Z/
url https://issues.chromium.org/issues/395032416
3
reference_url https://security.gentoo.org/glsa/202507-07
reference_id GLSA-202507-07
reference_type
scores
url https://security.gentoo.org/glsa/202507-07
4
reference_url https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html
reference_id stable-channel-update-for-desktop_10.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-12T04:00:34Z/
url https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-2136
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j9bt-u7v1-mkgt
6
url VCID-jaep-1ut3-9qan
vulnerability_id VCID-jaep-1ut3-9qan
summary libxslt: Use-After-Free in libxslt numbers.c
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24855.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24855.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24855
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15187
published_at 2026-04-16T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15377
published_at 2026-04-11T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15337
published_at 2026-04-12T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15272
published_at 2026-04-13T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15404
published_at 2026-04-02T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15473
published_at 2026-04-04T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15277
published_at 2026-04-07T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15365
published_at 2026-04-08T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15415
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24855
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24855
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24855
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100566
reference_id 1100566
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100566
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2352483
reference_id 2352483
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2352483
6
reference_url https://access.redhat.com/errata/RHSA-2025:3107
reference_id RHSA-2025:3107
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3107
7
reference_url https://access.redhat.com/errata/RHSA-2025:3389
reference_id RHSA-2025:3389
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3389
8
reference_url https://access.redhat.com/errata/RHSA-2025:3528
reference_id RHSA-2025:3528
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3528
9
reference_url https://access.redhat.com/errata/RHSA-2025:3615
reference_id RHSA-2025:3615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3615
10
reference_url https://access.redhat.com/errata/RHSA-2025:3619
reference_id RHSA-2025:3619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3619
11
reference_url https://access.redhat.com/errata/RHSA-2025:3624
reference_id RHSA-2025:3624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3624
12
reference_url https://access.redhat.com/errata/RHSA-2025:3625
reference_id RHSA-2025:3625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3625
13
reference_url https://access.redhat.com/errata/RHSA-2025:3626
reference_id RHSA-2025:3626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3626
14
reference_url https://access.redhat.com/errata/RHSA-2025:3627
reference_id RHSA-2025:3627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3627
15
reference_url https://access.redhat.com/errata/RHSA-2025:4098
reference_id RHSA-2025:4098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4098
16
reference_url https://access.redhat.com/errata/RHSA-2025:4422
reference_id RHSA-2025:4422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4422
17
reference_url https://access.redhat.com/errata/RHSA-2025:4427
reference_id RHSA-2025:4427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4427
18
reference_url https://access.redhat.com/errata/RHSA-2025:4431
reference_id RHSA-2025:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4431
19
reference_url https://access.redhat.com/errata/RHSA-2025:4677
reference_id RHSA-2025:4677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4677
20
reference_url https://access.redhat.com/errata/RHSA-2025:4731
reference_id RHSA-2025:4731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4731
21
reference_url https://access.redhat.com/errata/RHSA-2025:7496
reference_id RHSA-2025:7496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7496
22
reference_url https://access.redhat.com/errata/RHSA-2025:7702
reference_id RHSA-2025:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7702
23
reference_url https://access.redhat.com/errata/RHSA-2025:8303
reference_id RHSA-2025:8303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8303
24
reference_url https://usn.ubuntu.com/7361-1/
reference_id USN-7361-1
reference_type
scores
url https://usn.ubuntu.com/7361-1/
25
reference_url https://usn.ubuntu.com/7787-1/
reference_id USN-7787-1
reference_type
scores
url https://usn.ubuntu.com/7787-1/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-24855
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jaep-1ut3-9qan
7
url VCID-mhfc-jc5n-gfbu
vulnerability_id VCID-mhfc-jc5n-gfbu
summary Heap buffer overflow in GPU in Google Chrome on Android prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1426
reference_id
reference_type
scores
0
value 0.00391
scoring_system epss
scoring_elements 0.60167
published_at 2026-04-16T12:55:00Z
1
value 0.00391
scoring_system epss
scoring_elements 0.6016
published_at 2026-04-11T12:55:00Z
2
value 0.00391
scoring_system epss
scoring_elements 0.60146
published_at 2026-04-12T12:55:00Z
3
value 0.00391
scoring_system epss
scoring_elements 0.60128
published_at 2026-04-13T12:55:00Z
4
value 0.00391
scoring_system epss
scoring_elements 0.60081
published_at 2026-04-02T12:55:00Z
5
value 0.00391
scoring_system epss
scoring_elements 0.60106
published_at 2026-04-04T12:55:00Z
6
value 0.00391
scoring_system epss
scoring_elements 0.60075
published_at 2026-04-07T12:55:00Z
7
value 0.00391
scoring_system epss
scoring_elements 0.60125
published_at 2026-04-08T12:55:00Z
8
value 0.00391
scoring_system epss
scoring_elements 0.60139
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1426
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1426
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1426
2
reference_url https://issues.chromium.org/issues/383465163
reference_id 383465163
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T20:08:33Z/
url https://issues.chromium.org/issues/383465163
3
reference_url https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html
reference_id stable-channel-update-for-desktop_18.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T20:08:33Z/
url https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-1426
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mhfc-jc5n-gfbu
8
url VCID-sbba-7wah-s3dm
vulnerability_id VCID-sbba-7wah-s3dm
summary Out of bounds read in Media in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-1919
reference_id
reference_type
scores
0
value 0.00111
scoring_system epss
scoring_elements 0.296
published_at 2026-04-02T12:55:00Z
1
value 0.00111
scoring_system epss
scoring_elements 0.29648
published_at 2026-04-04T12:55:00Z
2
value 0.00111
scoring_system epss
scoring_elements 0.29469
published_at 2026-04-07T12:55:00Z
3
value 0.00111
scoring_system epss
scoring_elements 0.29532
published_at 2026-04-08T12:55:00Z
4
value 0.00111
scoring_system epss
scoring_elements 0.29571
published_at 2026-04-09T12:55:00Z
5
value 0.00111
scoring_system epss
scoring_elements 0.29573
published_at 2026-04-11T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35894
published_at 2026-04-12T12:55:00Z
7
value 0.00318
scoring_system epss
scoring_elements 0.54886
published_at 2026-04-13T12:55:00Z
8
value 0.00318
scoring_system epss
scoring_elements 0.54924
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-1919
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1919
2
reference_url https://issues.chromium.org/issues/392375312
reference_id 392375312
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:13Z/
url https://issues.chromium.org/issues/392375312
3
reference_url https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-06T04:55:13Z/
url https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-1919
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sbba-7wah-s3dm
9
url VCID-tt6y-5hu2-xfcj
vulnerability_id VCID-tt6y-5hu2-xfcj
summary Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-12694
reference_id
reference_type
scores
0
value 0.00519
scoring_system epss
scoring_elements 0.66798
published_at 2026-04-13T12:55:00Z
1
value 0.00519
scoring_system epss
scoring_elements 0.6681
published_at 2026-04-08T12:55:00Z
2
value 0.00519
scoring_system epss
scoring_elements 0.66825
published_at 2026-04-09T12:55:00Z
3
value 0.00519
scoring_system epss
scoring_elements 0.66845
published_at 2026-04-11T12:55:00Z
4
value 0.00519
scoring_system epss
scoring_elements 0.66831
published_at 2026-04-16T12:55:00Z
5
value 0.00519
scoring_system epss
scoring_elements 0.66763
published_at 2026-04-02T12:55:00Z
6
value 0.00519
scoring_system epss
scoring_elements 0.66789
published_at 2026-04-04T12:55:00Z
7
value 0.00519
scoring_system epss
scoring_elements 0.66761
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-12694
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12694
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12694
2
reference_url https://issues.chromium.org/issues/368222741
reference_id 368222741
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-20T04:55:46Z/
url https://issues.chromium.org/issues/368222741
3
reference_url https://security.gentoo.org/glsa/202507-07
reference_id GLSA-202507-07
reference_type
scores
url https://security.gentoo.org/glsa/202507-07
4
reference_url https://chromereleases.googleblog.com/2024/12/stable-channel-update-for-desktop_18.html
reference_id stable-channel-update-for-desktop_18.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-20T04:55:46Z/
url https://chromereleases.googleblog.com/2024/12/stable-channel-update-for-desktop_18.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2024-12694
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tt6y-5hu2-xfcj
10
url VCID-z7hh-qpzy-c7b2
vulnerability_id VCID-z7hh-qpzy-c7b2
summary libxslt: Use-After-Free in libxslt (xsltGetInheritedNsList)
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-55549.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-55549.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-55549
reference_id
reference_type
scores
0
value 0.0005
scoring_system epss
scoring_elements 0.15569
published_at 2026-04-04T12:55:00Z
1
value 0.0005
scoring_system epss
scoring_elements 0.15455
published_at 2026-04-08T12:55:00Z
2
value 0.0005
scoring_system epss
scoring_elements 0.15368
published_at 2026-04-07T12:55:00Z
3
value 0.0005
scoring_system epss
scoring_elements 0.15498
published_at 2026-04-02T12:55:00Z
4
value 0.00051
scoring_system epss
scoring_elements 0.15811
published_at 2026-04-16T12:55:00Z
5
value 0.00051
scoring_system epss
scoring_elements 0.15992
published_at 2026-04-11T12:55:00Z
6
value 0.00051
scoring_system epss
scoring_elements 0.15954
published_at 2026-04-12T12:55:00Z
7
value 0.00051
scoring_system epss
scoring_elements 0.15886
published_at 2026-04-13T12:55:00Z
8
value 0.00051
scoring_system epss
scoring_elements 0.16014
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-55549
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55549
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-55549
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100565
reference_id 1100565
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1100565
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2352484
reference_id 2352484
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2352484
6
reference_url https://access.redhat.com/errata/RHSA-2025:3613
reference_id RHSA-2025:3613
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3613
7
reference_url https://access.redhat.com/errata/RHSA-2025:3614
reference_id RHSA-2025:3614
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3614
8
reference_url https://access.redhat.com/errata/RHSA-2025:3615
reference_id RHSA-2025:3615
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3615
9
reference_url https://access.redhat.com/errata/RHSA-2025:3619
reference_id RHSA-2025:3619
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3619
10
reference_url https://access.redhat.com/errata/RHSA-2025:3624
reference_id RHSA-2025:3624
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3624
11
reference_url https://access.redhat.com/errata/RHSA-2025:3625
reference_id RHSA-2025:3625
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3625
12
reference_url https://access.redhat.com/errata/RHSA-2025:3626
reference_id RHSA-2025:3626
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3626
13
reference_url https://access.redhat.com/errata/RHSA-2025:3627
reference_id RHSA-2025:3627
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3627
14
reference_url https://access.redhat.com/errata/RHSA-2025:4025
reference_id RHSA-2025:4025
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4025
15
reference_url https://access.redhat.com/errata/RHSA-2025:4098
reference_id RHSA-2025:4098
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4098
16
reference_url https://access.redhat.com/errata/RHSA-2025:4422
reference_id RHSA-2025:4422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4422
17
reference_url https://access.redhat.com/errata/RHSA-2025:4427
reference_id RHSA-2025:4427
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4427
18
reference_url https://access.redhat.com/errata/RHSA-2025:4431
reference_id RHSA-2025:4431
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4431
19
reference_url https://access.redhat.com/errata/RHSA-2025:4677
reference_id RHSA-2025:4677
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4677
20
reference_url https://access.redhat.com/errata/RHSA-2025:4731
reference_id RHSA-2025:4731
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4731
21
reference_url https://access.redhat.com/errata/RHSA-2025:7410
reference_id RHSA-2025:7410
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7410
22
reference_url https://access.redhat.com/errata/RHSA-2025:7496
reference_id RHSA-2025:7496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7496
23
reference_url https://access.redhat.com/errata/RHSA-2025:7702
reference_id RHSA-2025:7702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7702
24
reference_url https://access.redhat.com/errata/RHSA-2025:8303
reference_id RHSA-2025:8303
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8303
25
reference_url https://usn.ubuntu.com/7357-1/
reference_id USN-7357-1
reference_type
scores
url https://usn.ubuntu.com/7357-1/
26
reference_url https://usn.ubuntu.com/7787-1/
reference_id USN-7787-1
reference_type
scores
url https://usn.ubuntu.com/7787-1/
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2024-55549
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7hh-qpzy-c7b2
11
url VCID-zjtf-w6bv-dbfe
vulnerability_id VCID-zjtf-w6bv-dbfe
summary mojo: chromium: chromium Mojo on Windows
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2783.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-2783.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-2783
reference_id
reference_type
scores
0
value 0.39478
scoring_system epss
scoring_elements 0.97308
published_at 2026-04-16T12:55:00Z
1
value 0.39478
scoring_system epss
scoring_elements 0.97294
published_at 2026-04-08T12:55:00Z
2
value 0.39478
scoring_system epss
scoring_elements 0.97295
published_at 2026-04-09T12:55:00Z
3
value 0.39478
scoring_system epss
scoring_elements 0.97298
published_at 2026-04-11T12:55:00Z
4
value 0.39478
scoring_system epss
scoring_elements 0.97299
published_at 2026-04-13T12:55:00Z
5
value 0.39478
scoring_system epss
scoring_elements 0.97282
published_at 2026-04-02T12:55:00Z
6
value 0.39478
scoring_system epss
scoring_elements 0.97287
published_at 2026-04-04T12:55:00Z
7
value 0.39478
scoring_system epss
scoring_elements 0.97288
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-2783
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2355557
reference_id 2355557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2355557
3
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/webapps/52403.txt
reference_id CVE-2025-2783
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/windows/webapps/52403.txt
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-2783
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zjtf-w6bv-dbfe
12
url VCID-zr38-fv5c-jkfy
vulnerability_id VCID-zr38-fv5c-jkfy
summary Inappropriate implementation in Browser UI in Google Chrome on Android prior to 133.0.6943.98 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0996
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25283
published_at 2026-04-16T12:55:00Z
1
value 0.00089
scoring_system epss
scoring_elements 0.25372
published_at 2026-04-11T12:55:00Z
2
value 0.00089
scoring_system epss
scoring_elements 0.2533
published_at 2026-04-12T12:55:00Z
3
value 0.00089
scoring_system epss
scoring_elements 0.25277
published_at 2026-04-13T12:55:00Z
4
value 0.00089
scoring_system epss
scoring_elements 0.25439
published_at 2026-04-02T12:55:00Z
5
value 0.00089
scoring_system epss
scoring_elements 0.25474
published_at 2026-04-04T12:55:00Z
6
value 0.00089
scoring_system epss
scoring_elements 0.25247
published_at 2026-04-07T12:55:00Z
7
value 0.00089
scoring_system epss
scoring_elements 0.25316
published_at 2026-04-08T12:55:00Z
8
value 0.00089
scoring_system epss
scoring_elements 0.2536
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0996
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0996
2
reference_url https://issues.chromium.org/issues/391788835
reference_id 391788835
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T17:17:20Z/
url https://issues.chromium.org/issues/391788835
3
reference_url https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-18T17:17:20Z/
url https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-0996
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zr38-fv5c-jkfy
13
url VCID-zr5w-q9zh-nqbm
vulnerability_id VCID-zr5w-q9zh-nqbm
summary Heap buffer overflow in V8 in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-0999
reference_id
reference_type
scores
0
value 0.00716
scoring_system epss
scoring_elements 0.7241
published_at 2026-04-16T12:55:00Z
1
value 0.00716
scoring_system epss
scoring_elements 0.72398
published_at 2026-04-11T12:55:00Z
2
value 0.00716
scoring_system epss
scoring_elements 0.72381
published_at 2026-04-12T12:55:00Z
3
value 0.00716
scoring_system epss
scoring_elements 0.72369
published_at 2026-04-13T12:55:00Z
4
value 0.00716
scoring_system epss
scoring_elements 0.72329
published_at 2026-04-02T12:55:00Z
5
value 0.00716
scoring_system epss
scoring_elements 0.72347
published_at 2026-04-04T12:55:00Z
6
value 0.00716
scoring_system epss
scoring_elements 0.72324
published_at 2026-04-07T12:55:00Z
7
value 0.00716
scoring_system epss
scoring_elements 0.72362
published_at 2026-04-08T12:55:00Z
8
value 0.00716
scoring_system epss
scoring_elements 0.72375
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-0999
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0999
2
reference_url https://issues.chromium.org/issues/394350433
reference_id 394350433
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T20:05:30Z/
url https://issues.chromium.org/issues/394350433
3
reference_url https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html
reference_id stable-channel-update-for-desktop_18.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-19T20:05:30Z/
url https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html
fixed_packages
0
url pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10?arch=ppc64le&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community
aliases CVE-2025-0999
risk_score 2.6
exploitability 0.5
weighted_severity 5.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zr5w-q9zh-nqbm
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt5-qtwebengine@5.15.17-r10%3Farch=ppc64le&distroversion=v3.23&reponame=community