{"url":"http://public2.vulnerablecode.io/api/packages/437155?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1?arch=s390x&distroversion=v3.23&reponame=community","type":"apk","namespace":"alpine","name":"qt6-qtwebengine","version":"6.8.3-r1","qualifiers":{"arch":"s390x","distroversion":"v3.23","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"6.9.1-r3","latest_non_vulnerable_version":"6.10.1-r14","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96742?format=json","vulnerability_id":"VCID-2rju-kk9j-1kbb","summary":"Inappropriate implementation in FileSystemAccess API in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5065","reference_id":"","reference_type":"","scores":[{"value":"0.00102","scoring_system":"epss","scoring_elements":"0.28053","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.3159","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31672","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31676","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31634","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31598","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31771","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31726","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31642","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5065"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5065","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5065"},{"reference_url":"https://issues.chromium.org/issues/40059071","reference_id":"40059071","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:33:16Z/"}],"url":"https://issues.chromium.org/issues/40059071"},{"reference_url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html","reference_id":"stable-channel-update-for-desktop_27.html","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:33:16Z/"}],"url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/437155?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2025-5065"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2rju-kk9j-1kbb"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96741?format=json","vulnerability_id":"VCID-34ga-6n2z-4bcm","summary":"Inappropriate implementation in Background Fetch API in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5064","reference_id":"","reference_type":"","scores":[{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32169","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32206","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32167","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32135","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32264","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32302","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32126","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32176","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00128","scoring_system":"epss","scoring_elements":"0.32203","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5064"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5064","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5064"},{"reference_url":"https://issues.chromium.org/issues/40058068","reference_id":"40058068","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:34:05Z/"}],"url":"https://issues.chromium.org/issues/40058068"},{"reference_url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html","reference_id":"stable-channel-update-for-desktop_27.html","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:34:05Z/"}],"url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/437155?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2025-5064"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-34ga-6n2z-4bcm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96740?format=json","vulnerability_id":"VCID-8vsf-szma-sbad","summary":"Use after free in Compositing in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5063","reference_id":"","reference_type":"","scores":[{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63955","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63968","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63954","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63902","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63929","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63887","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63937","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00457","scoring_system":"epss","scoring_elements":"0.63956","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5063"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5063","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5063"},{"reference_url":"https://issues.chromium.org/issues/411573532","reference_id":"411573532","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T03:55:44Z/"}],"url":"https://issues.chromium.org/issues/411573532"},{"reference_url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html","reference_id":"stable-channel-update-for-desktop_27.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T03:55:44Z/"}],"url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/437155?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2025-5063"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8vsf-szma-sbad"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/56158?format=json","vulnerability_id":"VCID-98mt-7srw-qfh4","summary":"A vulnerability has been discovered in libvpx, which could lead to execution of arbitrary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5283.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-5283.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5283","reference_id":"","reference_type":"","scores":[{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50758","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50756","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50681","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50663","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50718","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00273","scoring_system":"epss","scoring_elements":"0.50707","published_at":"2026-04-04T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5283"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5283","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5283"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106689","reference_id":"1106689","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1106689"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368749","reference_id":"2368749","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2368749"},{"reference_url":"https://issues.chromium.org/issues/419467315","reference_id":"419467315","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:25:59Z/"}],"url":"https://issues.chromium.org/issues/419467315"},{"reference_url":"https://security.gentoo.org/glsa/202509-07","reference_id":"GLSA-202509-07","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202509-07"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-42","reference_id":"mfsa2025-42","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-42"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-43","reference_id":"mfsa2025-43","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-43"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-44","reference_id":"mfsa2025-44","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-44"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-45","reference_id":"mfsa2025-45","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-45"},{"reference_url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-46","reference_id":"mfsa2025-46","reference_type":"","scores":[{"value":"critical","scoring_system":"generic_textual","scoring_elements":""}],"url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-46"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8293","reference_id":"RHSA-2025:8293","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8293"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8308","reference_id":"RHSA-2025:8308","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8308"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8341","reference_id":"RHSA-2025:8341","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8341"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8598","reference_id":"RHSA-2025:8598","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8599","reference_id":"RHSA-2025:8599","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8599"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8607","reference_id":"RHSA-2025:8607","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8607"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8608","reference_id":"RHSA-2025:8608","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8608"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8628","reference_id":"RHSA-2025:8628","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8629","reference_id":"RHSA-2025:8629","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8629"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8630","reference_id":"RHSA-2025:8630","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8631","reference_id":"RHSA-2025:8631","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8631"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8642","reference_id":"RHSA-2025:8642","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8642"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8756","reference_id":"RHSA-2025:8756","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8756"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9071","reference_id":"RHSA-2025:9071","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9071"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9072","reference_id":"RHSA-2025:9072","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9072"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9073","reference_id":"RHSA-2025:9073","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9073"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9074","reference_id":"RHSA-2025:9074","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9074"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9075","reference_id":"RHSA-2025:9075","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9075"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9076","reference_id":"RHSA-2025:9076","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9076"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9077","reference_id":"RHSA-2025:9077","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9077"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9118","reference_id":"RHSA-2025:9118","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9118"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9119","reference_id":"RHSA-2025:9119","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9119"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9120","reference_id":"RHSA-2025:9120","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9120"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9122","reference_id":"RHSA-2025:9122","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9122"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9123","reference_id":"RHSA-2025:9123","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9123"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9124","reference_id":"RHSA-2025:9124","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9125","reference_id":"RHSA-2025:9125","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9125"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9126","reference_id":"RHSA-2025:9126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9127","reference_id":"RHSA-2025:9127","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9127"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9128","reference_id":"RHSA-2025:9128","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9128"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9155","reference_id":"RHSA-2025:9155","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9155"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:9331","reference_id":"RHSA-2025:9331","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:9331"},{"reference_url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html","reference_id":"stable-channel-update-for-desktop_27.html","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:25:59Z/"}],"url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html"},{"reference_url":"https://usn.ubuntu.com/7551-1/","reference_id":"USN-7551-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7551-1/"},{"reference_url":"https://usn.ubuntu.com/7991-1/","reference_id":"USN-7991-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7991-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/437155?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2025-5283"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-98mt-7srw-qfh4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96758?format=json","vulnerability_id":"VCID-9q9q-6hv9-zkfc","summary":"Inappropriate implementation in BFCache in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially obtain user information via a crafted HTML page. (Chromium security severity: Medium)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5281","reference_id":"","reference_type":"","scores":[{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43935","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43922","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43889","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43873","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43897","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.4392","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43851","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43901","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00213","scoring_system":"epss","scoring_elements":"0.43904","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-5281"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5281","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5281"},{"reference_url":"https://issues.chromium.org/issues/417215501","reference_id":"417215501","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:27:42Z/"}],"url":"https://issues.chromium.org/issues/417215501"},{"reference_url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html","reference_id":"stable-channel-update-for-desktop_27.html","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-28T13:27:42Z/"}],"url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_27.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/437155?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2025-5281"],"risk_score":1.6,"exploitability":"0.5","weighted_severity":"3.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9q9q-6hv9-zkfc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73066?format=json","vulnerability_id":"VCID-k2kp-fv3q-vyh2","summary":"libexpat: expat: DoS via XML_ResumeParser","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50602.json","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-50602.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-50602","reference_id":"","reference_type":"","scores":[{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31946","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32016","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32019","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3198","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32074","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32114","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.31987","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-50602"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-50602"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086134","reference_id":"1086134","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1086134"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2321987","reference_id":"2321987","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2321987"},{"reference_url":"https://github.com/libexpat/libexpat/pull/915","reference_id":"915","reference_type":"","scores":[{"value":"5.9","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:P/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T18:00:51Z/"}],"url":"https://github.com/libexpat/libexpat/pull/915"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:11200","reference_id":"RHSA-2024:11200","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:11200"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9502","reference_id":"RHSA-2024:9502","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9541","reference_id":"RHSA-2024:9541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:3350","reference_id":"RHSA-2025:3350","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:3350"},{"reference_url":"https://usn.ubuntu.com/7145-1/","reference_id":"USN-7145-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7145-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/437155?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2024-50602"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k2kp-fv3q-vyh2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/82723?format=json","vulnerability_id":"VCID-zzsv-3v7k-n3ep","summary":"hunspell: out-of-bounds read in SuggestMgr::leftcommonsubstring in suggestmgr.cxx","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16707.json","reference_id":"","reference_type":"","scores":[{"value":"5.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2019-16707.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16707","reference_id":"","reference_type":"","scores":[{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67156","published_at":"2026-04-01T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.6723","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67259","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67278","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67264","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67194","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67218","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0053","scoring_system":"epss","scoring_elements":"0.67245","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2019-16707"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16707"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"3.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://github.com/butterflyhack/hunspell-crash","reference_id":"","reference_type":"","scores":[],"url":"https://github.com/butterflyhack/hunspell-crash"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24NTBHK2QNYKSBMJI34WEU5MHS3H2FAI/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/24NTBHK2QNYKSBMJI34WEU5MHS3H2FAI/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2YOYFI36IWKABNGFTWXCH7TTGAFODH6/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/D2YOYFI36IWKABNGFTWXCH7TTGAFODH6/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNTSVWI4SWBQL6XMXNGEH7EAQ45WN63G/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LNTSVWI4SWBQL6XMXNGEH7EAQ45WN63G/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD4AJ4M74VT3I6L37E4P5DNYZYBZIOVM/","reference_id":"","reference_type":"","scores":[],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UD4AJ4M74VT3I6L37E4P5DNYZYBZIOVM/"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=1771026","reference_id":"1771026","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=1771026"},{"reference_url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941185","reference_id":"941185","reference_type":"","scores":[],"url":"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=941185"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hunspell_project:hunspell:1.7.0:*:*:*:*:*:*:*","reference_id":"cpe:2.3:a:hunspell_project:hunspell:1.7.0:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:hunspell_project:hunspell:1.7.0:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_id":"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*"},{"reference_url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16707","reference_id":"CVE-2019-16707","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv2","scoring_elements":"AV:N/AC:M/Au:N/C:N/I:N/A:P"},{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-16707"},{"reference_url":"https://access.redhat.com/errata/RHSA-2020:3971","reference_id":"RHSA-2020:3971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2020:3971"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/437155?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1?arch=s390x&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1%3Farch=s390x&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2019-16707"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zzsv-3v7k-n3ep"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.3-r1%3Farch=s390x&distroversion=v3.23&reponame=community"}