Lookup for vulnerable packages by Package URL.
| Purl | pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4?arch=x86_64&distroversion=v3.23&reponame=community |
| Type | apk |
| Namespace | alpine |
| Name | qt6-qtwebengine |
| Version | 6.8.2-r4 |
| Qualifiers |
| arch |
x86_64 |
| distroversion |
v3.23 |
| reponame |
community |
|
| Subpath | |
| Is_vulnerable | false |
| Next_non_vulnerable_version | 6.8.3-r1 |
| Latest_non_vulnerable_version | 6.10.1-r14 |
| Affected_by_vulnerabilities |
|
| Fixing_vulnerabilities |
| 0 |
| url |
VCID-agp5-s1r2-yygj |
| vulnerability_id |
VCID-agp5-s1r2-yygj |
| summary |
Insufficient policy enforcement in Loader in Google Chrome prior to 136.0.7103.113 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4664 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29525 |
| published_at |
2026-04-26T12:55:00Z |
|
| 1 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29315 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
0.00113 |
| scoring_system |
epss |
| scoring_elements |
0.29462 |
| published_at |
2026-04-29T12:55:00Z |
|
| 3 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30728 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30664 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30646 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30613 |
| published_at |
2026-04-21T12:55:00Z |
|
| 7 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30433 |
| published_at |
2026-04-24T12:55:00Z |
|
| 8 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30817 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30635 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30693 |
| published_at |
2026-04-08T12:55:00Z |
|
| 11 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30725 |
| published_at |
2026-04-09T12:55:00Z |
|
| 12 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30769 |
| published_at |
2026-04-02T12:55:00Z |
|
| 13 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30683 |
| published_at |
2026-04-12T12:55:00Z |
|
| 14 |
| value |
0.00118 |
| scoring_system |
epss |
| scoring_elements |
0.30639 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4664 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-4664
|
| risk_score |
1.3 |
| exploitability |
0.5 |
| weighted_severity |
2.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-agp5-s1r2-yygj |
|
| 1 |
| url |
VCID-b1jg-wapn-efb2 |
| vulnerability_id |
VCID-b1jg-wapn-efb2 |
| summary |
Inappropriate implementation in DevTools in Google Chrome prior to 136.0.7103.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Low) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4052 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.4096 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41183 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41178 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41098 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41366 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41395 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41322 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41372 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.4138 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.414 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41369 |
| published_at |
2026-04-18T12:55:00Z |
|
| 11 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41355 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41398 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00194 |
| scoring_system |
epss |
| scoring_elements |
0.41295 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4052 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-4052
|
| risk_score |
3.0 |
| exploitability |
0.5 |
| weighted_severity |
5.9 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b1jg-wapn-efb2 |
|
| 2 |
| url |
VCID-bzqm-cncx-rydw |
| vulnerability_id |
VCID-bzqm-cncx-rydw |
| summary |
Incorrect handle provided in unspecified circumstances in Mojo in Google Chrome on Windows prior to 136.0.7103.113 allowed a remote attacker to potentially perform a sandbox escape via a malicious file. (Chromium security severity: High) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4609 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07657 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07721 |
| published_at |
2026-04-24T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07699 |
| published_at |
2026-04-26T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07676 |
| published_at |
2026-04-29T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07644 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07686 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07656 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07715 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07734 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07733 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07719 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07703 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07629 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07616 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07766 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4609 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-4609
|
| risk_score |
2.9 |
| exploitability |
0.5 |
| weighted_severity |
5.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bzqm-cncx-rydw |
|
| 3 |
| url |
VCID-k73q-j1pc-4kcn |
| vulnerability_id |
VCID-k73q-j1pc-4kcn |
| summary |
SQLite: integer overflow in SQLite |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-3277 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.72975 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73105 |
| published_at |
2026-05-05T12:55:00Z |
|
| 2 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73103 |
| published_at |
2026-04-24T12:55:00Z |
|
| 3 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73114 |
| published_at |
2026-04-26T12:55:00Z |
|
| 4 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73112 |
| published_at |
2026-04-29T12:55:00Z |
|
| 5 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.72995 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.72971 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73008 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73022 |
| published_at |
2026-04-09T12:55:00Z |
|
| 9 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73046 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73025 |
| published_at |
2026-04-12T12:55:00Z |
|
| 11 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73019 |
| published_at |
2026-04-13T12:55:00Z |
|
| 12 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73062 |
| published_at |
2026-04-16T12:55:00Z |
|
| 13 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73071 |
| published_at |
2026-04-18T12:55:00Z |
|
| 14 |
| value |
0.00744 |
| scoring_system |
epss |
| scoring_elements |
0.73064 |
| published_at |
2026-04-21T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-3277 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-3277
|
| risk_score |
3.3 |
| exploitability |
0.5 |
| weighted_severity |
6.6 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k73q-j1pc-4kcn |
|
| 4 |
| url |
VCID-x4d1-jf7f-uugy |
| vulnerability_id |
VCID-x4d1-jf7f-uugy |
| summary |
Insufficient data validation in DevTools in Google Chrome prior to 136.0.7103.59 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass discretionary access control via a crafted HTML page. (Chromium security severity: Medium) |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4051 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.3101 |
| published_at |
2026-05-05T12:55:00Z |
|
| 1 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31692 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31541 |
| published_at |
2026-04-21T12:55:00Z |
|
| 3 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31367 |
| published_at |
2026-04-24T12:55:00Z |
|
| 4 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31241 |
| published_at |
2026-04-26T12:55:00Z |
|
| 5 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31162 |
| published_at |
2026-04-29T12:55:00Z |
|
| 6 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31735 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31554 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31606 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31635 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31638 |
| published_at |
2026-04-11T12:55:00Z |
|
| 11 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31597 |
| published_at |
2026-04-12T12:55:00Z |
|
| 12 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31561 |
| published_at |
2026-04-13T12:55:00Z |
|
| 13 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31595 |
| published_at |
2026-04-16T12:55:00Z |
|
| 14 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31573 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-4051 |
|
| 1 |
|
| 2 |
|
| 3 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-4051
|
| risk_score |
1.9 |
| exploitability |
0.5 |
| weighted_severity |
3.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x4d1-jf7f-uugy |
|
|
| Risk_score | null |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:apk/alpine/qt6-qtwebengine@6.8.2-r4%3Farch=x86_64&distroversion=v3.23&reponame=community |