Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Nameqt6-qtwebengine
Version6.9.3-r2
Qualifiers
arch x86
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.10.0-r1
Latest_non_vulnerable_version6.10.1-r14
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-e73p-589d-7qdm
vulnerability_id VCID-e73p-589d-7qdm
summary Joplin is a free, open source note taking and to-do application, which can handle a large number of notes organised into notebooks. This vulnerability is caused by differences between how Joplin's HTML sanitizer handles comments and how the browser handles comments. This affects both the Rich Text Editor and the Markdown viewer. However, unlike the Rich Text Editor, the Markdown viewer is `cross-origin isolated`, which prevents JavaScript from directly accessing functions/variables in the toplevel Joplin `window`. This issue is not present in Joplin 3.1.24 and may have been introduced in `9b50539`. This is an XSS vulnerability that impacts users that open untrusted notes in the Rich Text Editor. This vulnerability has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24028
reference_id
reference_type
scores
0
value 0.00342
scoring_system epss
scoring_elements 0.56902
published_at 2026-04-18T12:55:00Z
1
value 0.00342
scoring_system epss
scoring_elements 0.56855
published_at 2026-04-07T12:55:00Z
2
value 0.00342
scoring_system epss
scoring_elements 0.56907
published_at 2026-04-08T12:55:00Z
3
value 0.00342
scoring_system epss
scoring_elements 0.5691
published_at 2026-04-09T12:55:00Z
4
value 0.00342
scoring_system epss
scoring_elements 0.56919
published_at 2026-04-11T12:55:00Z
5
value 0.00342
scoring_system epss
scoring_elements 0.56899
published_at 2026-04-12T12:55:00Z
6
value 0.00342
scoring_system epss
scoring_elements 0.56876
published_at 2026-04-13T12:55:00Z
7
value 0.00342
scoring_system epss
scoring_elements 0.56905
published_at 2026-04-16T12:55:00Z
8
value 0.00342
scoring_system epss
scoring_elements 0.56858
published_at 2026-04-02T12:55:00Z
9
value 0.00342
scoring_system epss
scoring_elements 0.56879
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24028
1
reference_url https://github.com/laurent22/joplin/commit/2a058ed8097c2502e152b26394dc1917897f5817
reference_id 2a058ed8097c2502e152b26394dc1917897f5817
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:17:07Z/
url https://github.com/laurent22/joplin/commit/2a058ed8097c2502e152b26394dc1917897f5817
2
reference_url https://github.com/laurent22/joplin/commit/9b505395918bc923f34fe6f3b960bb10e8cf234e
reference_id 9b505395918bc923f34fe6f3b960bb10e8cf234e
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:17:07Z/
url https://github.com/laurent22/joplin/commit/9b505395918bc923f34fe6f3b960bb10e8cf234e
3
reference_url https://github.com/laurent22/joplin/security/advisories/GHSA-5w3c-wph9-hq92
reference_id GHSA-5w3c-wph9-hq92
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:17:07Z/
url https://github.com/laurent22/joplin/security/advisories/GHSA-5w3c-wph9-hq92
4
reference_url https://joplinapp.org/help/dev/spec/note_viewer_isolation
reference_id note_viewer_isolation
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-10T17:17:07Z/
url https://joplinapp.org/help/dev/spec/note_viewer_isolation
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=x86&distroversion=v3.23&reponame=community
aliases CVE-2025-24028
risk_score null
exploitability null
weighted_severity null
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e73p-589d-7qdm
1
url VCID-tfc2-749m-sqh1
vulnerability_id VCID-tfc2-749m-sqh1
summary Insufficient validation of untrusted input in Core in Google Chrome prior to 139.0.7258.66 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-8582
reference_id
reference_type
scores
0
value 0.00062
scoring_system epss
scoring_elements 0.19426
published_at 2026-04-02T12:55:00Z
1
value 0.00062
scoring_system epss
scoring_elements 0.19474
published_at 2026-04-04T12:55:00Z
2
value 0.00062
scoring_system epss
scoring_elements 0.19192
published_at 2026-04-07T12:55:00Z
3
value 0.00062
scoring_system epss
scoring_elements 0.1927
published_at 2026-04-08T12:55:00Z
4
value 0.00062
scoring_system epss
scoring_elements 0.19322
published_at 2026-04-09T12:55:00Z
5
value 0.00062
scoring_system epss
scoring_elements 0.19327
published_at 2026-04-11T12:55:00Z
6
value 0.00067
scoring_system epss
scoring_elements 0.20751
published_at 2026-04-12T12:55:00Z
7
value 0.00067
scoring_system epss
scoring_elements 0.207
published_at 2026-04-13T12:55:00Z
8
value 0.00067
scoring_system epss
scoring_elements 0.2069
published_at 2026-04-16T12:55:00Z
9
value 0.00067
scoring_system epss
scoring_elements 0.20686
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-8582
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8582
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8582
2
reference_url https://issues.chromium.org/issues/40089450
reference_id 40089450
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T13:24:17Z/
url https://issues.chromium.org/issues/40089450
3
reference_url https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html
reference_id stable-channel-update-for-desktop.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-08-07T13:24:17Z/
url https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.9.1-r3?arch=x86&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.1-r3?arch=x86&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.1-r3%3Farch=x86&distroversion=v3.23&reponame=community
1
url pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2?arch=x86&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=x86&distroversion=v3.23&reponame=community
aliases CVE-2025-8582
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tfc2-749m-sqh1
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.9.3-r2%3Farch=x86&distroversion=v3.23&reponame=community