{"url":"http://public2.vulnerablecode.io/api/packages/527513?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=armv7&distroversion=v3.23&reponame=community","type":"apk","namespace":"alpine","name":"qt6-qtwebengine","version":"6.8.2-r4","qualifiers":{"arch":"armv7","distroversion":"v3.23","reponame":"community"},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"6.8.3-r1","latest_non_vulnerable_version":"6.10.1-r14","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96710?format=json","vulnerability_id":"VCID-agp5-s1r2-yygj","summary":"Insufficient policy enforcement in Loader in Google Chrome prior to 136.0.7103.113 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4664","reference_id":"","reference_type":"","scores":[{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29525","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29315","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29462","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30728","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30664","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30646","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30613","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30433","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30817","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30635","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30693","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30725","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30769","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30683","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30639","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4664"},{"reference_url":"https://issues.chromium.org/issues/415810136","reference_id":"415810136","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-05T19:18:35Z/"}],"url":"https://issues.chromium.org/issues/415810136"},{"reference_url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html","reference_id":"stable-channel-update-for-desktop_14.html","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-05T19:18:35Z/"}],"url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/527513?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2025-4664"],"risk_score":1.3,"exploitability":"0.5","weighted_severity":"2.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-agp5-s1r2-yygj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96675?format=json","vulnerability_id":"VCID-b1jg-wapn-efb2","summary":"Inappropriate implementation in DevTools in Google Chrome prior to 136.0.7103.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Low)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4052","reference_id":"","reference_type":"","scores":[{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.4096","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41183","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41178","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41098","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41395","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41322","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41372","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.4138","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.414","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41369","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41355","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41398","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00194","scoring_system":"epss","scoring_elements":"0.41295","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4052"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4052","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4052"},{"reference_url":"https://issues.chromium.org/issues/401927528","reference_id":"401927528","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-06T13:47:54Z/"}],"url":"https://issues.chromium.org/issues/401927528"},{"reference_url":"https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_29.html","reference_id":"stable-channel-update-for-desktop_29.html","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-06T13:47:54Z/"}],"url":"https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_29.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/527513?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2025-4052"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b1jg-wapn-efb2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96703?format=json","vulnerability_id":"VCID-bzqm-cncx-rydw","summary":"Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 136.0.7103.113 allowed a remote attacker to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4609","reference_id":"","reference_type":"","scores":[{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07657","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07721","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07699","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07676","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07644","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07686","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07656","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07715","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07733","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07719","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07703","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07629","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07616","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07766","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4609"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4609","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4609"},{"reference_url":"https://issues.chromium.org/issues/412578726","reference_id":"412578726","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-25T12:17:52Z/"}],"url":"https://issues.chromium.org/issues/412578726"},{"reference_url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html","reference_id":"stable-channel-update-for-desktop_14.html","reference_type":"","scores":[{"value":"9.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-25T12:17:52Z/"}],"url":"https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/527513?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2025-4609"],"risk_score":2.9,"exploitability":"0.5","weighted_severity":"5.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bzqm-cncx-rydw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/70397?format=json","vulnerability_id":"VCID-k73q-j1pc-4kcn","summary":"SQLite: integer overflow in SQLite","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3277.json","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3277.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-3277","reference_id":"","reference_type":"","scores":[{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.72975","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73105","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73103","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73114","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73112","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.72995","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.72971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73008","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73022","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73046","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73025","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73019","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73062","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73071","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00744","scoring_system":"epss","scoring_elements":"0.73064","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-3277"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359553","reference_id":"2359553","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2359553"},{"reference_url":"https://sqlite.org/src/info/498e3f1cf57f164f","reference_id":"498e3f1cf57f164f","reference_type":"","scores":[{"value":"6.9","scoring_system":"cvssv4","scoring_elements":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:26Z/"}],"url":"https://sqlite.org/src/info/498e3f1cf57f164f"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:4459","reference_id":"RHSA-2025:4459","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:4459"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7433","reference_id":"RHSA-2025:7433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7517","reference_id":"RHSA-2025:7517","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7517"},{"reference_url":"https://usn.ubuntu.com/7528-1/","reference_id":"USN-7528-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7528-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/527513?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2025-3277"],"risk_score":3.3,"exploitability":"0.5","weighted_severity":"6.6","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-k73q-j1pc-4kcn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/96674?format=json","vulnerability_id":"VCID-x4d1-jf7f-uugy","summary":"Insufficient data validation in DevTools in Google Chrome prior to 136.0.7103.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Medium)","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4051","reference_id":"","reference_type":"","scores":[{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.3101","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31692","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31541","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31367","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31241","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31162","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31735","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31554","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31606","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31635","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31597","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31595","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00124","scoring_system":"epss","scoring_elements":"0.31573","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-4051"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4051","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4051"},{"reference_url":"https://issues.chromium.org/issues/404000989","reference_id":"404000989","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:54:40Z/"}],"url":"https://issues.chromium.org/issues/404000989"},{"reference_url":"https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_29.html","reference_id":"stable-channel-update-for-desktop_29.html","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:54:40Z/"}],"url":"https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_29.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/527513?format=json","purl":"pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=armv7&distroversion=v3.23&reponame=community","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}],"aliases":["CVE-2025-4051"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x4d1-jf7f-uugy"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=armv7&distroversion=v3.23&reponame=community"}