Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=s390x&distroversion=v3.20&reponame=community
Typeapk
Namespacealpine
Nameqt6-qtwebengine
Version6.6.1-r3
Qualifiers
arch s390x
distroversion v3.20
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.6.1-r4
Latest_non_vulnerable_version6.6.3-r6
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-9czp-wct7-8qa7
vulnerability_id VCID-9czp-wct7-8qa7
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6703
reference_id
reference_type
scores
0
value 0.00337
scoring_system epss
scoring_elements 0.56569
published_at 2026-04-02T12:55:00Z
1
value 0.00337
scoring_system epss
scoring_elements 0.5659
published_at 2026-04-04T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.56568
published_at 2026-04-07T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.5662
published_at 2026-04-08T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.56624
published_at 2026-04-09T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56633
published_at 2026-04-11T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56609
published_at 2026-04-12T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56587
published_at 2026-04-13T12:55:00Z
8
value 0.00337
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-16T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56617
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6703
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2023-6703
risk_score null
exploitability 0.5
weighted_severity 0.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9czp-wct7-8qa7
1
url VCID-k3n7-zdsw-eyg6
vulnerability_id VCID-k3n7-zdsw-eyg6
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6706
reference_id
reference_type
scores
0
value 0.00337
scoring_system epss
scoring_elements 0.56617
published_at 2026-04-18T12:55:00Z
1
value 0.00337
scoring_system epss
scoring_elements 0.56569
published_at 2026-04-02T12:55:00Z
2
value 0.00337
scoring_system epss
scoring_elements 0.5659
published_at 2026-04-04T12:55:00Z
3
value 0.00337
scoring_system epss
scoring_elements 0.56568
published_at 2026-04-07T12:55:00Z
4
value 0.00337
scoring_system epss
scoring_elements 0.5662
published_at 2026-04-08T12:55:00Z
5
value 0.00337
scoring_system epss
scoring_elements 0.56624
published_at 2026-04-09T12:55:00Z
6
value 0.00337
scoring_system epss
scoring_elements 0.56633
published_at 2026-04-11T12:55:00Z
7
value 0.00337
scoring_system epss
scoring_elements 0.56609
published_at 2026-04-12T12:55:00Z
8
value 0.00337
scoring_system epss
scoring_elements 0.56587
published_at 2026-04-13T12:55:00Z
9
value 0.00337
scoring_system epss
scoring_elements 0.56618
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6706
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1500921
reference_id 1500921
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/
url https://crbug.com/1500921
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:27Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2023-6706
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k3n7-zdsw-eyg6
2
url VCID-x8dh-sm6j-n7gd
vulnerability_id VCID-x8dh-sm6j-n7gd
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6705
reference_id
reference_type
scores
0
value 0.00357
scoring_system epss
scoring_elements 0.58023
published_at 2026-04-18T12:55:00Z
1
value 0.00357
scoring_system epss
scoring_elements 0.57966
published_at 2026-04-02T12:55:00Z
2
value 0.00357
scoring_system epss
scoring_elements 0.57985
published_at 2026-04-04T12:55:00Z
3
value 0.00357
scoring_system epss
scoring_elements 0.57961
published_at 2026-04-07T12:55:00Z
4
value 0.00357
scoring_system epss
scoring_elements 0.58017
published_at 2026-04-08T12:55:00Z
5
value 0.00357
scoring_system epss
scoring_elements 0.58019
published_at 2026-04-09T12:55:00Z
6
value 0.00357
scoring_system epss
scoring_elements 0.58036
published_at 2026-04-11T12:55:00Z
7
value 0.00357
scoring_system epss
scoring_elements 0.58014
published_at 2026-04-12T12:55:00Z
8
value 0.00357
scoring_system epss
scoring_elements 0.57994
published_at 2026-04-13T12:55:00Z
9
value 0.00357
scoring_system epss
scoring_elements 0.58024
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6705
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1505708
reference_id 1505708
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/
url https://crbug.com/1505708
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:26Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2023-6705
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x8dh-sm6j-n7gd
3
url VCID-y2u9-49qt-a3e6
vulnerability_id VCID-y2u9-49qt-a3e6
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-6702
reference_id
reference_type
scores
0
value 0.51688
scoring_system epss
scoring_elements 0.97907
published_at 2026-04-18T12:55:00Z
1
value 0.51688
scoring_system epss
scoring_elements 0.97882
published_at 2026-04-02T12:55:00Z
2
value 0.51688
scoring_system epss
scoring_elements 0.97883
published_at 2026-04-04T12:55:00Z
3
value 0.51688
scoring_system epss
scoring_elements 0.97887
published_at 2026-04-07T12:55:00Z
4
value 0.51688
scoring_system epss
scoring_elements 0.97891
published_at 2026-04-08T12:55:00Z
5
value 0.51688
scoring_system epss
scoring_elements 0.97894
published_at 2026-04-09T12:55:00Z
6
value 0.51688
scoring_system epss
scoring_elements 0.97897
published_at 2026-04-11T12:55:00Z
7
value 0.51688
scoring_system epss
scoring_elements 0.97898
published_at 2026-04-12T12:55:00Z
8
value 0.51688
scoring_system epss
scoring_elements 0.97899
published_at 2026-04-13T12:55:00Z
9
value 0.51688
scoring_system epss
scoring_elements 0.97906
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-6702
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6702
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6703
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6704
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6706
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6707
7
reference_url https://crbug.com/1501326
reference_id 1501326
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/
url https://crbug.com/1501326
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
reference_id 6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6NWZ23ZJ62XKWVNGHSIZQYILVJWH5BLI/
9
reference_url https://security.gentoo.org/glsa/202402-14
reference_id GLSA-202402-14
reference_type
scores
url https://security.gentoo.org/glsa/202402-14
10
reference_url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
reference_id stable-channel-update-for-desktop_12.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2023-12-19T05:00:23Z/
url https://chromereleases.googleblog.com/2023/12/stable-channel-update-for-desktop_12.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=s390x&distroversion=v3.20&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3?arch=s390x&distroversion=v3.20&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3%3Farch=s390x&distroversion=v3.20&reponame=community
aliases CVE-2023-6702
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y2u9-49qt-a3e6
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.6.1-r3%3Farch=s390x&distroversion=v3.20&reponame=community