Lookup for vulnerable packages by Package URL.

Purlpkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
Typeapk
Namespacealpine
Nameqt6-qtwebengine
Version6.8.2-r4
Qualifiers
arch x86_64
distroversion v3.23
reponame community
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version6.8.3-r1
Latest_non_vulnerable_version6.10.1-r14
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-agp5-s1r2-yygj
vulnerability_id VCID-agp5-s1r2-yygj
summary Insufficient policy enforcement in Loader in Google Chrome prior to 136.0.7103.113 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4664
reference_id
reference_type
scores
0
value 0.00113
scoring_system epss
scoring_elements 0.29525
published_at 2026-04-26T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29315
published_at 2026-05-05T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29462
published_at 2026-04-29T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30728
published_at 2026-04-11T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30664
published_at 2026-04-16T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30646
published_at 2026-04-18T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30613
published_at 2026-04-21T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30433
published_at 2026-04-24T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30817
published_at 2026-04-04T12:55:00Z
9
value 0.00118
scoring_system epss
scoring_elements 0.30635
published_at 2026-04-07T12:55:00Z
10
value 0.00118
scoring_system epss
scoring_elements 0.30693
published_at 2026-04-08T12:55:00Z
11
value 0.00118
scoring_system epss
scoring_elements 0.30725
published_at 2026-04-09T12:55:00Z
12
value 0.00118
scoring_system epss
scoring_elements 0.30769
published_at 2026-04-02T12:55:00Z
13
value 0.00118
scoring_system epss
scoring_elements 0.30683
published_at 2026-04-12T12:55:00Z
14
value 0.00118
scoring_system epss
scoring_elements 0.30639
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4664
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4664
2
reference_url https://issues.chromium.org/issues/415810136
reference_id 415810136
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-05T19:18:35Z/
url https://issues.chromium.org/issues/415810136
3
reference_url https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-05T19:18:35Z/
url https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2025-4664
risk_score 1.3
exploitability 0.5
weighted_severity 2.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-agp5-s1r2-yygj
1
url VCID-b1jg-wapn-efb2
vulnerability_id VCID-b1jg-wapn-efb2
summary Inappropriate implementation in DevTools in Google Chrome prior to 136.0.7103.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Low)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4052
reference_id
reference_type
scores
0
value 0.00194
scoring_system epss
scoring_elements 0.4096
published_at 2026-05-05T12:55:00Z
1
value 0.00194
scoring_system epss
scoring_elements 0.41183
published_at 2026-04-24T12:55:00Z
2
value 0.00194
scoring_system epss
scoring_elements 0.41178
published_at 2026-04-26T12:55:00Z
3
value 0.00194
scoring_system epss
scoring_elements 0.41098
published_at 2026-04-29T12:55:00Z
4
value 0.00194
scoring_system epss
scoring_elements 0.41366
published_at 2026-04-02T12:55:00Z
5
value 0.00194
scoring_system epss
scoring_elements 0.41395
published_at 2026-04-04T12:55:00Z
6
value 0.00194
scoring_system epss
scoring_elements 0.41322
published_at 2026-04-07T12:55:00Z
7
value 0.00194
scoring_system epss
scoring_elements 0.41372
published_at 2026-04-08T12:55:00Z
8
value 0.00194
scoring_system epss
scoring_elements 0.4138
published_at 2026-04-09T12:55:00Z
9
value 0.00194
scoring_system epss
scoring_elements 0.414
published_at 2026-04-11T12:55:00Z
10
value 0.00194
scoring_system epss
scoring_elements 0.41369
published_at 2026-04-18T12:55:00Z
11
value 0.00194
scoring_system epss
scoring_elements 0.41355
published_at 2026-04-13T12:55:00Z
12
value 0.00194
scoring_system epss
scoring_elements 0.41398
published_at 2026-04-16T12:55:00Z
13
value 0.00194
scoring_system epss
scoring_elements 0.41295
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4052
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4052
2
reference_url https://issues.chromium.org/issues/401927528
reference_id 401927528
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-06T13:47:54Z/
url https://issues.chromium.org/issues/401927528
3
reference_url https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_29.html
reference_id stable-channel-update-for-desktop_29.html
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-06T13:47:54Z/
url https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_29.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2025-4052
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b1jg-wapn-efb2
2
url VCID-bzqm-cncx-rydw
vulnerability_id VCID-bzqm-cncx-rydw
summary Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 136.0.7103.113 allowed a remote attacker to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4609
reference_id
reference_type
scores
0
value 0.00027
scoring_system epss
scoring_elements 0.07657
published_at 2026-05-05T12:55:00Z
1
value 0.00027
scoring_system epss
scoring_elements 0.07721
published_at 2026-04-24T12:55:00Z
2
value 0.00027
scoring_system epss
scoring_elements 0.07699
published_at 2026-04-26T12:55:00Z
3
value 0.00027
scoring_system epss
scoring_elements 0.07676
published_at 2026-04-29T12:55:00Z
4
value 0.00027
scoring_system epss
scoring_elements 0.07644
published_at 2026-04-02T12:55:00Z
5
value 0.00027
scoring_system epss
scoring_elements 0.07686
published_at 2026-04-04T12:55:00Z
6
value 0.00027
scoring_system epss
scoring_elements 0.07656
published_at 2026-04-07T12:55:00Z
7
value 0.00027
scoring_system epss
scoring_elements 0.07715
published_at 2026-04-08T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07734
published_at 2026-04-09T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07733
published_at 2026-04-11T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07719
published_at 2026-04-12T12:55:00Z
11
value 0.00027
scoring_system epss
scoring_elements 0.07703
published_at 2026-04-13T12:55:00Z
12
value 0.00027
scoring_system epss
scoring_elements 0.07629
published_at 2026-04-16T12:55:00Z
13
value 0.00027
scoring_system epss
scoring_elements 0.07616
published_at 2026-04-18T12:55:00Z
14
value 0.00027
scoring_system epss
scoring_elements 0.07766
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4609
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4609
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4609
2
reference_url https://issues.chromium.org/issues/412578726
reference_id 412578726
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-25T12:17:52Z/
url https://issues.chromium.org/issues/412578726
3
reference_url https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html
reference_id stable-channel-update-for-desktop_14.html
reference_type
scores
0
value 9.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-25T12:17:52Z/
url https://chromereleases.googleblog.com/2025/05/stable-channel-update-for-desktop_14.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2025-4609
risk_score 2.9
exploitability 0.5
weighted_severity 5.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bzqm-cncx-rydw
3
url VCID-k73q-j1pc-4kcn
vulnerability_id VCID-k73q-j1pc-4kcn
summary SQLite: integer overflow in SQLite
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3277.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-3277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-3277
reference_id
reference_type
scores
0
value 0.00744
scoring_system epss
scoring_elements 0.72975
published_at 2026-04-02T12:55:00Z
1
value 0.00744
scoring_system epss
scoring_elements 0.73105
published_at 2026-05-05T12:55:00Z
2
value 0.00744
scoring_system epss
scoring_elements 0.73103
published_at 2026-04-24T12:55:00Z
3
value 0.00744
scoring_system epss
scoring_elements 0.73114
published_at 2026-04-26T12:55:00Z
4
value 0.00744
scoring_system epss
scoring_elements 0.73112
published_at 2026-04-29T12:55:00Z
5
value 0.00744
scoring_system epss
scoring_elements 0.72995
published_at 2026-04-04T12:55:00Z
6
value 0.00744
scoring_system epss
scoring_elements 0.72971
published_at 2026-04-07T12:55:00Z
7
value 0.00744
scoring_system epss
scoring_elements 0.73008
published_at 2026-04-08T12:55:00Z
8
value 0.00744
scoring_system epss
scoring_elements 0.73022
published_at 2026-04-09T12:55:00Z
9
value 0.00744
scoring_system epss
scoring_elements 0.73046
published_at 2026-04-11T12:55:00Z
10
value 0.00744
scoring_system epss
scoring_elements 0.73025
published_at 2026-04-12T12:55:00Z
11
value 0.00744
scoring_system epss
scoring_elements 0.73019
published_at 2026-04-13T12:55:00Z
12
value 0.00744
scoring_system epss
scoring_elements 0.73062
published_at 2026-04-16T12:55:00Z
13
value 0.00744
scoring_system epss
scoring_elements 0.73071
published_at 2026-04-18T12:55:00Z
14
value 0.00744
scoring_system epss
scoring_elements 0.73064
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-3277
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2359553
reference_id 2359553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2359553
4
reference_url https://sqlite.org/src/info/498e3f1cf57f164f
reference_id 498e3f1cf57f164f
reference_type
scores
0
value 6.9
scoring_system cvssv4
scoring_elements CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-14T17:15:26Z/
url https://sqlite.org/src/info/498e3f1cf57f164f
5
reference_url https://access.redhat.com/errata/RHSA-2025:4459
reference_id RHSA-2025:4459
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4459
6
reference_url https://access.redhat.com/errata/RHSA-2025:7433
reference_id RHSA-2025:7433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7433
7
reference_url https://access.redhat.com/errata/RHSA-2025:7517
reference_id RHSA-2025:7517
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7517
8
reference_url https://usn.ubuntu.com/7528-1/
reference_id USN-7528-1
reference_type
scores
url https://usn.ubuntu.com/7528-1/
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2025-3277
risk_score 3.3
exploitability 0.5
weighted_severity 6.6
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k73q-j1pc-4kcn
4
url VCID-x4d1-jf7f-uugy
vulnerability_id VCID-x4d1-jf7f-uugy
summary Insufficient data validation in DevTools in Google Chrome prior to 136.0.7103.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Medium)
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-4051
reference_id
reference_type
scores
0
value 0.00124
scoring_system epss
scoring_elements 0.3101
published_at 2026-05-05T12:55:00Z
1
value 0.00124
scoring_system epss
scoring_elements 0.31692
published_at 2026-04-02T12:55:00Z
2
value 0.00124
scoring_system epss
scoring_elements 0.31541
published_at 2026-04-21T12:55:00Z
3
value 0.00124
scoring_system epss
scoring_elements 0.31367
published_at 2026-04-24T12:55:00Z
4
value 0.00124
scoring_system epss
scoring_elements 0.31241
published_at 2026-04-26T12:55:00Z
5
value 0.00124
scoring_system epss
scoring_elements 0.31162
published_at 2026-04-29T12:55:00Z
6
value 0.00124
scoring_system epss
scoring_elements 0.31735
published_at 2026-04-04T12:55:00Z
7
value 0.00124
scoring_system epss
scoring_elements 0.31554
published_at 2026-04-07T12:55:00Z
8
value 0.00124
scoring_system epss
scoring_elements 0.31606
published_at 2026-04-08T12:55:00Z
9
value 0.00124
scoring_system epss
scoring_elements 0.31635
published_at 2026-04-09T12:55:00Z
10
value 0.00124
scoring_system epss
scoring_elements 0.31638
published_at 2026-04-11T12:55:00Z
11
value 0.00124
scoring_system epss
scoring_elements 0.31597
published_at 2026-04-12T12:55:00Z
12
value 0.00124
scoring_system epss
scoring_elements 0.31561
published_at 2026-04-13T12:55:00Z
13
value 0.00124
scoring_system epss
scoring_elements 0.31595
published_at 2026-04-16T12:55:00Z
14
value 0.00124
scoring_system epss
scoring_elements 0.31573
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-4051
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4051
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4051
2
reference_url https://issues.chromium.org/issues/404000989
reference_id 404000989
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:54:40Z/
url https://issues.chromium.org/issues/404000989
3
reference_url https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_29.html
reference_id stable-channel-update-for-desktop_29.html
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T18:54:40Z/
url https://chromereleases.googleblog.com/2025/04/stable-channel-update-for-desktop_29.html
fixed_packages
0
url pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
purl pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=x86_64&distroversion=v3.23&reponame=community
aliases CVE-2025-4051
risk_score 1.9
exploitability 0.5
weighted_severity 3.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x4d1-jf7f-uugy
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=x86_64&distroversion=v3.23&reponame=community