Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/1076492?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "type": "deb", "namespace": "debian", "name": "wpewebkit", "version": "2.52.3-1", "qualifiers": {}, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": null, "latest_non_vulnerable_version": null, "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61856?format=api", "vulnerability_id": "VCID-1vsk-e1mf-6uaz", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43216", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28385", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29906", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29953", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29912", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.30035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29849", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29857", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36009", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36076", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00153", "scoring_system": "epss", "scoring_elements": "0.36062", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124148", "reference_id": "124148", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124148" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386273", "reference_id": "2386273", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386273" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43216" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vsk-e1mf-6uaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64216?format=api", "vulnerability_id": "VCID-25ng-4kwb-qfat", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20636", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12475", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12468", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12606", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12648", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12628", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12738", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12549", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18606", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448791", "reference_id": "2448791", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448791" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-20636" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-25ng-4kwb-qfat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66399?format=api", "vulnerability_id": "VCID-2hr6-uu49-1qb7", "summary": "webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13947", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17412", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22519", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22443", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22464", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22423", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22368", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22386", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22382", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22307", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22388", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22624", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13947" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418576", "reference_id": "2418576", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418576" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7", "reference_id": "cpe:/o:redhat:rhel_els:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-13947", "reference_id": "CVE-2025-13947", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-13947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=271957", "reference_id": "show_bug.cgi?id=271957", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://bugs.webkit.org/show_bug.cgi?id=271957" }, { "reference_url": "https://usn.ubuntu.com/7941-1/", "reference_id": "USN-7941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7941-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-13947" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2hr6-uu49-1qb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66451?format=api", "vulnerability_id": "VCID-2pgr-9muu-s3ge", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43443", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14973", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15114", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15061", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15169", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14982", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15043", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15081", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16305", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20467", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20468", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.2087", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43443" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416337", "reference_id": "2416337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43443" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgr-9muu-s3ge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61852?format=api", "vulnerability_id": "VCID-3k6e-zz11-93bn", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31273", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28387", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28431", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28427", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28384", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28318", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.2833", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34218", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34265", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00141", "scoring_system": "epss", "scoring_elements": "0.34253", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386268", "reference_id": "2386268", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386268" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-31273" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3k6e-zz11-93bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64217?format=api", "vulnerability_id": "VCID-4k57-k2s6-wkhx", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20644", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1368", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1347", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13474", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13559", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13607", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13644", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13674", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13623", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13542", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22409", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126347", "reference_id": "126347", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/" } ], "url": "https://support.apple.com/en-us/126347" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448792", "reference_id": "2448792", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448792" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-20644" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4k57-k2s6-wkhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61855?format=api", "vulnerability_id": "VCID-5q44-vqhn-zydx", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43212", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26184", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26229", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26221", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26334", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26106", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.3198", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32029", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00127", "scoring_system": "epss", "scoring_elements": "0.32006", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386271", "reference_id": "2386271", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386271" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43212" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5q44-vqhn-zydx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65877?format=api", "vulnerability_id": "VCID-76jg-y2sa-f7cu", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43501", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22817", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22722", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22706", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22763", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22801", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22728", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28916", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00107", "scoring_system": "epss", "scoring_elements": "0.28961", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43501" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423185", "reference_id": "2423185", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43501" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-76jg-y2sa-f7cu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66445?format=api", "vulnerability_id": "VCID-7j7p-hnbd-hudk", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43429", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13587", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13719", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13785", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13604", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14338", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18915", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.18902", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19305", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43429" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416330", "reference_id": "2416330", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43429" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7j7p-hnbd-hudk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64206?format=api", "vulnerability_id": "VCID-7ut5-fu6w-63fs", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3113", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31216", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.3126", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31225", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31172", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31173", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37363", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37437", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00164", "scoring_system": "epss", "scoring_elements": "0.37419", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448781", "reference_id": "2448781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448781" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43213" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ut5-fu6w-63fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63947?format=api", "vulnerability_id": "VCID-88kv-qter-5fc3", "summary": "webkitgtk: A malicious website may be able to access script message handlers intended for other origins", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10458", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10517", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10377", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10514", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10511", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10489", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1033", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126793", "reference_id": "126793", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/" } ], "url": "https://support.apple.com/en-us/126793" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453007", "reference_id": "2453007", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453007" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-28861" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88kv-qter-5fc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63942?format=api", "vulnerability_id": "VCID-8cxd-4p9j-dyf1", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20664", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11507", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11422", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11561", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11348", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11432", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11489", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11495", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11462", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11433", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11299", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453001", "reference_id": "2453001", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-20664" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8cxd-4p9j-dyf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64212?format=api", "vulnerability_id": "VCID-988h-sqnj-57fg", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1933", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19178", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19125", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19184", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24924", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24932", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24919", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31875", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125890", "reference_id": "125890", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125890" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448787", "reference_id": "2448787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448787" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43511" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-988h-sqnj-57fg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66446?format=api", "vulnerability_id": "VCID-ahcu-937r-57fu", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43430", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26308", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26528", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.2633", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26388", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26434", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26731", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00097", "scoring_system": "epss", "scoring_elements": "0.26759", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27201", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27546", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416331", "reference_id": "2416331", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416331" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43430" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ahcu-937r-57fu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67451?format=api", "vulnerability_id": "VCID-aqvh-emss-bufx", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14617", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14812", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14706", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14765", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15105", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17045", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16984", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17153", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17106", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21543", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397630", "reference_id": "2397630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397630" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20922", "reference_id": "RHSA-2025:20922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20922" }, { "reference_url": "https://usn.ubuntu.com/7817-1/", "reference_id": "USN-7817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7817-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43368" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aqvh-emss-bufx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66442?format=api", "vulnerability_id": "VCID-az2z-2mnu-sfbh", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43419", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10411", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10552", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10484", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10526", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10548", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10581", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17189", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17182", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17625", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://support.apple.com/en-us/125114", "reference_id": "125114", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/" } ], "url": "https://support.apple.com/en-us/125114" }, { "reference_url": "https://support.apple.com/en-us/125115", "reference_id": "125115", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/" } ], "url": "https://support.apple.com/en-us/125115" }, { "reference_url": "https://support.apple.com/en-us/125116", "reference_id": "125116", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/" } ], "url": "https://support.apple.com/en-us/125116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416326", "reference_id": "2416326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43419" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-az2z-2mnu-sfbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64209?format=api", "vulnerability_id": "VCID-bjtx-twmy-jbgk", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43438", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10694", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1063", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10703", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1158", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15041", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43438" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448784", "reference_id": "2448784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448784" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43438" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bjtx-twmy-jbgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65878?format=api", "vulnerability_id": "VCID-dvx9-km9t-yqfv", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30817", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30711", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30733", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30777", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30774", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30742", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30865", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30683", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37908", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37968", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125889", "reference_id": "125889", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125889" }, { "reference_url": "https://support.apple.com/en-us/125890", "reference_id": "125890", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125890" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423187", "reference_id": "2423187", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43531" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvx9-km9t-yqfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67448?format=api", "vulnerability_id": "VCID-ednn-ppw1-myfk", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43272", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19812", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19667", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19614", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19534", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22045", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22086", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21978", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21983", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21985", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26056", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://support.apple.com/en-us/125115", "reference_id": "125115", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/" } ], "url": "https://support.apple.com/en-us/125115" }, { "reference_url": "https://support.apple.com/en-us/125116", "reference_id": "125116", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/" } ], "url": "https://support.apple.com/en-us/125116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397626", "reference_id": "2397626", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397626" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20922", "reference_id": "RHSA-2025:20922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20922" }, { "reference_url": "https://usn.ubuntu.com/7817-1/", "reference_id": "USN-7817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7817-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43272" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ednn-ppw1-myfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66367?format=api", "vulnerability_id": "VCID-ems1-41u6-vbex", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43458", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22029", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22117", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22044", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22678", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27683", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27709", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28104", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418855", "reference_id": "2418855", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7941-1/", "reference_id": "USN-7941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7941-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43458" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ems1-41u6-vbex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66453?format=api", "vulnerability_id": "VCID-epzj-t14z-43d2", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43421", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08272", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08353", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08336", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08327", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08307", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08324", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08344", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08623", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1128", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11279", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11718", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416355", "reference_id": "2416355", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416355" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7941-1/", "reference_id": "USN-7941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7941-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43421" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-epzj-t14z-43d2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63948?format=api", "vulnerability_id": "VCID-eu4s-vvyf-pqh3", "summary": "webkitgtk: Visiting a maliciously crafted website may lead to a cross-site scripting attack", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10075", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10129", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10135", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10032", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10108", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10169", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10209", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10149", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10022", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09999", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126793", "reference_id": "126793", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/" } ], "url": "https://support.apple.com/en-us/126793" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453008", "reference_id": "2453008", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453008" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-28871" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eu4s-vvyf-pqh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63946?format=api", "vulnerability_id": "VCID-ffha-wafn-sqa9", "summary": "webkitgtk: A malicious website may be able to process restricted web content outside the sandbox", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28859", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.12006", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11919", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1205", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11853", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11936", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11988", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11996", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11959", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11933", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11803", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.118", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126797", "reference_id": "126797", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126797" }, { "reference_url": "https://support.apple.com/en-us/126798", "reference_id": "126798", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126798" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453006", "reference_id": "2453006", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453006" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-28859" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ffha-wafn-sqa9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63944?format=api", "vulnerability_id": "VCID-fpvs-seby-kfhv", "summary": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20691", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10458", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10517", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10377", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10514", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10511", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10489", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10356", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1033", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126798", "reference_id": "126798", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/" } ], "url": "https://support.apple.com/en-us/126798" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453003", "reference_id": "2453003", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453003" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-20691" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fpvs-seby-kfhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66443?format=api", "vulnerability_id": "VCID-gqjq-p4re-gkf6", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43425", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10315", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10253", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10345", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10752", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14531", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14525", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14944", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43425" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416327", "reference_id": "2416327", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43425" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqjq-p4re-gkf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63943?format=api", "vulnerability_id": "VCID-gqm2-5nh3-7ufp", "summary": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20665", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3659", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36448", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36459", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36511", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3653", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36537", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36502", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36479", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36521", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36504", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126793", "reference_id": "126793", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126793" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126797", "reference_id": "126797", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126797" }, { "reference_url": "https://support.apple.com/en-us/126798", "reference_id": "126798", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126798" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453002", "reference_id": "2453002", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-20665" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqm2-5nh3-7ufp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64205?format=api", "vulnerability_id": "VCID-gwt6-n8ue-mqcf", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31277", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39143", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39174", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3912", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39175", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39163", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39147", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39173", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39092", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00186", "scoring_system": "epss", "scoring_elements": "0.40311", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.4111", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448780", "reference_id": "2448780", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-31277" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gwt6-n8ue-mqcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61860?format=api", "vulnerability_id": "VCID-hvj6-wsg9-1bhg", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04829", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05436", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0545", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05457", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05414", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0543", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07746", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07608", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00027", "scoring_system": "epss", "scoring_elements": "0.07596", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386276", "reference_id": "2386276", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386276" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43265" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvj6-wsg9-1bhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65881?format=api", "vulnerability_id": "VCID-j31g-7h17-27c8", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13378", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13239", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13443", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.1316", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13342", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13373", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13321", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16676", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20252", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423191", "reference_id": "2423191", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43541" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j31g-7h17-27c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64204?format=api", "vulnerability_id": "VCID-jbuw-yp7v-4fcz", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31223", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66897", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66859", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66831", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66894", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66914", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66868", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66901", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66915", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67378", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122404", "reference_id": "122404", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122404" }, { "reference_url": "https://support.apple.com/en-us/122716", "reference_id": "122716", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122716" }, { "reference_url": "https://support.apple.com/en-us/122719", "reference_id": "122719", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122719" }, { "reference_url": "https://support.apple.com/en-us/122720", "reference_id": "122720", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122720" }, { "reference_url": "https://support.apple.com/en-us/122721", "reference_id": "122721", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122721" }, { "reference_url": "https://support.apple.com/en-us/122722", "reference_id": "122722", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448779", "reference_id": "2448779", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-31223" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jbuw-yp7v-4fcz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66054?format=api", "vulnerability_id": "VCID-jyw2-fu8s-3fha", "summary": "Google Chrome: chromium: webkitgtk: Out of bounds memory access via crafted HTML page", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.7521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75819", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01002", "scoring_system": "epss", "scoring_elements": "0.77038", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.01047", "scoring_system": "epss", "scoring_elements": "0.77539", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.01047", "scoring_system": "epss", "scoring_elements": "0.77501", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01047", "scoring_system": "epss", "scoring_elements": "0.77536", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421824", "reference_id": "2421824", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421824" }, { "reference_url": "https://issues.chromium.org/issues/466192044", "reference_id": "466192044", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/" } ], "url": "https://issues.chromium.org/issues/466192044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html", "reference_id": "stable-channel-update-for-desktop_10.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/" } ], "url": "https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-14174" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jyw2-fu8s-3fha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67450?format=api", "vulnerability_id": "VCID-kx6w-wbua-5ffr", "summary": "webkitgtk: A website may be able to access sensor information without user consent", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43356", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15335", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15227", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16805", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.16765", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17565", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17557", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17611", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17662", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125109", "reference_id": "125109", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125109" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://support.apple.com/en-us/125114", "reference_id": "125114", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125114" }, { "reference_url": "https://support.apple.com/en-us/125115", "reference_id": "125115", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125115" }, { "reference_url": "https://support.apple.com/en-us/125116", "reference_id": "125116", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397628", "reference_id": "2397628", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397628" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20922", "reference_id": "RHSA-2025:20922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20922" }, { "reference_url": "https://usn.ubuntu.com/7817-1/", "reference_id": "USN-7817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7817-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43356" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kx6w-wbua-5ffr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66910?format=api", "vulnerability_id": "VCID-m59e-8bgm-77he", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43343", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35061", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.3798", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37963", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37917", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37942", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00217", "scoring_system": "epss", "scoring_elements": "0.44308", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125110", "reference_id": "125110", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125110" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://support.apple.com/en-us/125114", "reference_id": "125114", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125114" }, { "reference_url": "https://support.apple.com/en-us/125115", "reference_id": "125115", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125115" }, { "reference_url": "https://support.apple.com/en-us/125116", "reference_id": "125116", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403598", "reference_id": "2403598", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18070", "reference_id": "RHSA-2025:18070", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18070" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19913", "reference_id": "RHSA-2025:19913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19914", "reference_id": "RHSA-2025:19914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19915", "reference_id": "RHSA-2025:19915", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19915" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19916", "reference_id": "RHSA-2025:19916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19916" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19918", "reference_id": "RHSA-2025:19918", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19918" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19919", "reference_id": "RHSA-2025:19919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19920", "reference_id": "RHSA-2025:19920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19920" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19946", "reference_id": "RHSA-2025:19946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20922", "reference_id": "RHSA-2025:20922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20922" }, { "reference_url": "https://usn.ubuntu.com/7895-1/", "reference_id": "USN-7895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43343" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m59e-8bgm-77he" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66449?format=api", "vulnerability_id": "VCID-mfg4-2ma4-3qgj", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43434", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1063", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10694", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10703", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1158", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14991", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0005", "scoring_system": "epss", "scoring_elements": "0.15473", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416335", "reference_id": "2416335", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43434" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mfg4-2ma4-3qgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66447?format=api", "vulnerability_id": "VCID-mhfm-j5xm-wybd", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43431", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12936", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13015", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12942", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12988", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13027", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13065", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13656", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20413", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00068", "scoring_system": "epss", "scoring_elements": "0.20796", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43431" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416332", "reference_id": "2416332", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43431" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mhfm-j5xm-wybd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64215?format=api", "vulnerability_id": "VCID-mmcp-4qnx-5ufh", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20635", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15424", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15212", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15207", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15291", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15357", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15396", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15435", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15385", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15493", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15297", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00083", "scoring_system": "epss", "scoring_elements": "0.24221", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126347", "reference_id": "126347", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126347" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126351", "reference_id": "126351", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126351" }, { "reference_url": "https://support.apple.com/en-us/126352", "reference_id": "126352", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126352" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448790", "reference_id": "2448790", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-20635" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mmcp-4qnx-5ufh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65880?format=api", "vulnerability_id": "VCID-nmvc-maj7-rfhm", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43536", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18813", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18574", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.1863", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18681", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18728", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18723", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24527", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24551", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423190", "reference_id": "2423190", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43536" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nmvc-maj7-rfhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61859?format=api", "vulnerability_id": "VCID-nu9v-3xak-77aw", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43240", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08273", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0913", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09128", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09114", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17722", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17674", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00057", "scoring_system": "epss", "scoring_elements": "0.17683", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43240" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384385", "reference_id": "2384385", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384385" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43240" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nu9v-3xak-77aw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63941?format=api", "vulnerability_id": "VCID-nwkr-s7vs-p7fz", "summary": "webkitgtk: Processing maliciously crafted web content may bypass Same Origin Policy", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20643", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09744", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09655", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09771", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09788", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.0982", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.0981", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.0976", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09689", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10904", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.10783", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20643" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126604", "reference_id": "126604", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126604" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126793", "reference_id": "126793", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126793" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453000", "reference_id": "2453000", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-20643" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nwkr-s7vs-p7fz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61858?format=api", "vulnerability_id": "VCID-p84d-5ze6-9fb5", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43228", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11971", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1217", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12053", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12105", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12112", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12075", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12046", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18399", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18433", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00059", "scoring_system": "epss", "scoring_elements": "0.18412", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43228" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386275", "reference_id": "2386275", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386275" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43228" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p84d-5ze6-9fb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66045?format=api", "vulnerability_id": "VCID-ph63-r178-pfgg", "summary": "webkitgtk: webkitgtk: Use-after-free due to improper memory management", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31831", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31731", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31702", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.3165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34624", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35896", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35911", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35936", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00175", "scoring_system": "epss", "scoring_elements": "0.39005", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125889", "reference_id": "125889", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125889" }, { "reference_url": "https://support.apple.com/en-us/125890", "reference_id": "125890", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125890" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423166", "reference_id": "2423166", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43529" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ph63-r178-pfgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66450?format=api", "vulnerability_id": "VCID-pwqw-z8jj-abfs", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43440", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12027", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12161", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12109", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12226", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12131", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13044", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.1918", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00062", "scoring_system": "epss", "scoring_elements": "0.19171", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19628", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416336", "reference_id": "2416336", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43440" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwqw-z8jj-abfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66448?format=api", "vulnerability_id": "VCID-qytm-81jk-muhc", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43432", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10315", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10253", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10345", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10752", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14531", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14525", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14944", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416334", "reference_id": "2416334", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43432" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qytm-81jk-muhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61857?format=api", "vulnerability_id": "VCID-r857-ke39-xug8", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43227", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32854", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34668", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34704", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34676", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34632", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34644", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43889", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43966", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00214", "scoring_system": "epss", "scoring_elements": "0.43957", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43227" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386274", "reference_id": "2386274", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386274" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43227" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r857-ke39-xug8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66368?format=api", "vulnerability_id": "VCID-stjs-xknd-zfgh", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66287", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21619", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21677", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27562", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27719", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27675", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27626", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.276", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27604", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27671", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27714", "published_at": "2026-04-09T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66287" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418857", "reference_id": "2418857", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418857" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7", "reference_id": "cpe:/o:redhat:rhel_els:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-66287", "reference_id": "CVE-2025-66287", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-66287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7941-1/", "reference_id": "USN-7941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7941-1/" }, { "reference_url": "https://webkitgtk.org/security/WSA-2025-0009.html", "reference_id": "WSA-2025-0009.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://webkitgtk.org/security/WSA-2025-0009.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-66287" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-stjs-xknd-zfgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64219?format=api", "vulnerability_id": "VCID-t46t-rhgu-cbc1", "summary": "webkitgtk: A website may be able to track users through Safari web extensions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20676", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10572", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10555", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10694", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10718", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10749", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10735", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10679", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10747", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10606", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16188", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448794", "reference_id": "2448794", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448794" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-20676" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t46t-rhgu-cbc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64213?format=api", "vulnerability_id": "VCID-teue-y6qz-jyfw", "summary": "webkitgtk: Processing maliciously crafted web content may disclose internal states of the app", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-46299", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0601", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0621", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06046", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0603", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0607", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06109", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.061", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06094", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06086", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06051", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06061", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-46299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125889", "reference_id": "125889", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125889" }, { "reference_url": "https://support.apple.com/en-us/125890", "reference_id": "125890", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125890" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448788", "reference_id": "2448788", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448788" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-46299" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teue-y6qz-jyfw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66444?format=api", "vulnerability_id": "VCID-u6k6-1hmc-tfaf", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43427", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19456", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19535", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19484", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19542", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1959", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19975", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00064", "scoring_system": "epss", "scoring_elements": "0.19971", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20366", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20378", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43427" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416329", "reference_id": "2416329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43427" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u6k6-1hmc-tfaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64208?format=api", "vulnerability_id": "VCID-unu1-sbnm-27bf", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43433", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12936", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12942", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12988", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13027", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13065", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13015", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14014", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.2041", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00066", "scoring_system": "epss", "scoring_elements": "0.20413", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43433" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448783", "reference_id": "2448783", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43433" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unu1-sbnm-27bf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68659?format=api", "vulnerability_id": "VCID-vk4e-qufz-5ffp", "summary": "angle: insufficient input validation can cause undefined behavior", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38004", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37959", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37993", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37984", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38021", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44401", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44426", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44381", "published_at": "2026-04-07T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380254", "reference_id": "2380254", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380254" }, { "reference_url": "https://issues.chromium.org/issues/427162086", "reference_id": "427162086", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/" } ], "url": "https://issues.chromium.org/issues/427162086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html", "reference_id": "stable-channel-update-for-desktop_15.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/" } ], "url": "https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-6558" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vk4e-qufz-5ffp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66441?format=api", "vulnerability_id": "VCID-w3r3-11kt-2ydu", "summary": "webkitgtk: A website may exfiltrate image data cross-origin", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43392", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08649", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08627", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08639", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08664", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0864", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08987", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12483", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12365", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12367", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416325", "reference_id": "2416325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43392" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w3r3-11kt-2ydu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64218?format=api", "vulnerability_id": "VCID-w5gq-k53s-tuc5", "summary": "webkitgtk: A remote attacker may be able to cause a denial-of-service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37947", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37972", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38009", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37992", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38051", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.3793", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00255", "scoring_system": "epss", "scoring_elements": "0.48832", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126347", "reference_id": "126347", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/" } ], "url": "https://support.apple.com/en-us/126347" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448793", "reference_id": "2448793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448793" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-20652" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w5gq-k53s-tuc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67449?format=api", "vulnerability_id": "VCID-whma-xbxr-5uay", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43342", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52326", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52355", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52366", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.5237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52317", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00332", "scoring_system": "epss", "scoring_elements": "0.56104", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00332", "scoring_system": "epss", "scoring_elements": "0.56127", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00332", "scoring_system": "epss", "scoring_elements": "0.56124", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00332", "scoring_system": "epss", "scoring_elements": "0.56122", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00332", "scoring_system": "epss", "scoring_elements": "0.56087", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0043", "scoring_system": "epss", "scoring_elements": "0.62562", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125109", "reference_id": "125109", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125109" }, { "reference_url": "https://support.apple.com/en-us/125110", "reference_id": "125110", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125110" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://support.apple.com/en-us/125114", "reference_id": "125114", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125114" }, { "reference_url": "https://support.apple.com/en-us/125115", "reference_id": "125115", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125115" }, { "reference_url": "https://support.apple.com/en-us/125116", "reference_id": "125116", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397627", "reference_id": "2397627", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20922", "reference_id": "RHSA-2025:20922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20922" }, { "reference_url": "https://usn.ubuntu.com/7817-1/", "reference_id": "USN-7817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7817-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43342" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whma-xbxr-5uay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61854?format=api", "vulnerability_id": "VCID-wnxh-854z-ykfk", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43211", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05046", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04925", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04943", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04963", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04981", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04965", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0491", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04929", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06309", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06144", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06156", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124148", "reference_id": "124148", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124148" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386270", "reference_id": "2386270", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386270" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43211" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxh-854z-ykfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64211?format=api", "vulnerability_id": "VCID-wrt4-z8ne-zffm", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43457", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09009", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08977", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08959", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08972", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09336", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.14797", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00048", "scoring_system": "epss", "scoring_elements": "0.1479", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00084", "scoring_system": "epss", "scoring_elements": "0.24431", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448786", "reference_id": "2448786", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448786" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43457" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wrt4-z8ne-zffm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64207?format=api", "vulnerability_id": "VCID-x5sh-5xtn-r7cp", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3515", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37121", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.3696", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36986", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37021", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37013", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4447", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.4448", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0038", "scoring_system": "epss", "scoring_elements": "0.59506", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448782", "reference_id": "2448782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43214" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x5sh-5xtn-r7cp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64210?format=api", "vulnerability_id": "VCID-xpp8-357g-c7gp", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43441", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10694", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10703", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1063", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1158", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15041", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14981", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14991", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43441" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448785", "reference_id": "2448785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448785" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43441" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xpp8-357g-c7gp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66431?format=api", "vulnerability_id": "VCID-xr5y-1ebg-xqcj", "summary": "webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13502", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29498", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29431", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29472", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29475", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29379", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29399", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29373", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00112", "scoring_system": "epss", "scoring_elements": "0.29702", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13502" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416300", "reference_id": "2416300", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416300" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7", "reference_id": "cpe:/o:redhat:rhel_els:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-13502", "reference_id": "CVE-2025-13502", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-13502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://bugs.webkit.org/show_bug.cgi?id=302218", "reference_id": "show_bug.cgi?id=302218", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://bugs.webkit.org/show_bug.cgi?id=302218" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-13502" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xr5y-1ebg-xqcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64214?format=api", "vulnerability_id": "VCID-yfww-r9rn-73dy", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20608", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02479", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02467", "published_at": "2026-04-18T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02461", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0248", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02515", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02491", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02495", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06316", "published_at": "2026-04-21T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126347", "reference_id": "126347", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/" } ], "url": "https://support.apple.com/en-us/126347" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448789", "reference_id": "2448789", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-20608" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yfww-r9rn-73dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61853?format=api", "vulnerability_id": "VCID-yg6b-hsst-ckaa", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31278", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2663", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28568", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28612", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.2861", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28569", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28699", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28505", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28519", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.3441", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34464", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00142", "scoring_system": "epss", "scoring_elements": "0.34449", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31278" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124148", "reference_id": "124148", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124148" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386269", "reference_id": "2386269", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386269" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-31278" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6b-hsst-ckaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65879?format=api", "vulnerability_id": "VCID-z7hw-fywx-dffc", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11339", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11508", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11542", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11532", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14429", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14359", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423188", "reference_id": "2423188", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2025-43535" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7hw-fywx-dffc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63945?format=api", "vulnerability_id": "VCID-zk2j-9hd2-hfcn", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28857", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11507", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11422", "published_at": "2026-04-21T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11561", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11349", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1149", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11496", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11463", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11434", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.113", "published_at": "2026-04-16T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11299", "published_at": "2026-04-18T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453004", "reference_id": "2453004", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2026:9692", "reference_id": "RHSA-2026:9692", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2026:9692" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/994533?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1" }, { "url": "http://public2.vulnerablecode.io/api/packages/1076492?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.3-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" } ], "aliases": [ "CVE-2026-28857" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zk2j-9hd2-hfcn" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1" }