Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-libs/webkit-gtk@2.42.3
Typeebuild
Namespacenet-libs
Namewebkit-gtk
Version2.42.3
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.44.0
Latest_non_vulnerable_version4.38.00
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-2a1d-w9tn-x3h6
vulnerability_id VCID-2a1d-w9tn-x3h6
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38600
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-13T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-11T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-12T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.71155
published_at 2026-04-04T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71138
published_at 2026-04-02T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.71185
published_at 2026-04-09T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71172
published_at 2026-04-08T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.7113
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url http://www.openwall.com/lists/oss-security/2023/08/02/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url http://www.openwall.com/lists/oss-security/2023/08/02/1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231021
reference_id 2231021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231021
16
reference_url https://www.debian.org/security/2023/dsa-5468
reference_id dsa-5468
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://www.debian.org/security/2023/dsa-5468
17
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://security.gentoo.org/glsa/202401-04
18
reference_url https://support.apple.com/en-us/HT213841
reference_id HT213841
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213841
19
reference_url https://support.apple.com/en-us/HT213843
reference_id HT213843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213843
20
reference_url https://support.apple.com/en-us/HT213846
reference_id HT213846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213846
21
reference_url https://support.apple.com/en-us/HT213847
reference_id HT213847
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213847
22
reference_url https://support.apple.com/en-us/HT213848
reference_id HT213848
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213848
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
reference_id KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
reference_id KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
25
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
26
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
28
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-38600
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2a1d-w9tn-x3h6
1
url VCID-3ab6-tntn-67eb
vulnerability_id VCID-3ab6-tntn-67eb
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28204.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28204
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21726
published_at 2026-04-02T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21581
published_at 2026-04-13T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21781
published_at 2026-04-04T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21531
published_at 2026-04-07T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21607
published_at 2026-04-08T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21665
published_at 2026-04-09T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21677
published_at 2026-04-11T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21639
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2209208
reference_id 2209208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2209208
5
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://security.gentoo.org/glsa/202401-04
6
reference_url https://support.apple.com/en-us/HT213757
reference_id HT213757
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213757
7
reference_url https://support.apple.com/en-us/HT213758
reference_id HT213758
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213758
8
reference_url https://support.apple.com/en-us/HT213761
reference_id HT213761
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213761
9
reference_url https://support.apple.com/en-us/HT213762
reference_id HT213762
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213762
10
reference_url https://support.apple.com/en-us/HT213764
reference_id HT213764
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213764
11
reference_url https://support.apple.com/en-us/HT213765
reference_id HT213765
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213765
12
reference_url https://access.redhat.com/errata/RHSA-2023:3432
reference_id RHSA-2023:3432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3432
13
reference_url https://access.redhat.com/errata/RHSA-2023:3433
reference_id RHSA-2023:3433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3433
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-28204
risk_score 10.0
exploitability 2.0
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ab6-tntn-67eb
2
url VCID-3r9c-5ys2-43hw
vulnerability_id VCID-3r9c-5ys2-43hw
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38597
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55836
published_at 2026-04-13T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55875
published_at 2026-04-11T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55855
published_at 2026-04-12T12:55:00Z
3
value 0.00536
scoring_system epss
scoring_elements 0.67436
published_at 2026-04-07T12:55:00Z
4
value 0.00536
scoring_system epss
scoring_elements 0.67488
published_at 2026-04-08T12:55:00Z
5
value 0.00536
scoring_system epss
scoring_elements 0.67502
published_at 2026-04-09T12:55:00Z
6
value 0.00536
scoring_system epss
scoring_elements 0.67435
published_at 2026-04-02T12:55:00Z
7
value 0.00536
scoring_system epss
scoring_elements 0.67457
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231043
reference_id 2231043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231043
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-38597
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3r9c-5ys2-43hw
3
url VCID-5334-8qf3-tqbp
vulnerability_id VCID-5334-8qf3-tqbp
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32373.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32373
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.13004
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12861
published_at 2026-04-13T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.13053
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12853
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12931
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12982
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12942
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12906
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2209214
reference_id 2209214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2209214
6
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://security.gentoo.org/glsa/202401-04
7
reference_url https://support.apple.com/en-us/HT213757
reference_id HT213757
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213757
8
reference_url https://support.apple.com/en-us/HT213758
reference_id HT213758
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213758
9
reference_url https://support.apple.com/en-us/HT213761
reference_id HT213761
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213761
10
reference_url https://support.apple.com/en-us/HT213762
reference_id HT213762
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213762
11
reference_url https://support.apple.com/en-us/HT213764
reference_id HT213764
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213764
12
reference_url https://support.apple.com/en-us/HT213765
reference_id HT213765
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213765
13
reference_url https://access.redhat.com/errata/RHSA-2023:3432
reference_id RHSA-2023:3432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3432
14
reference_url https://access.redhat.com/errata/RHSA-2023:3433
reference_id RHSA-2023:3433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3433
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-32373
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5334-8qf3-tqbp
4
url VCID-6uck-ed5x-fyga
vulnerability_id VCID-6uck-ed5x-fyga
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38599
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62864
published_at 2026-04-13T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62897
published_at 2026-04-11T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62886
published_at 2026-04-12T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67723
published_at 2026-04-08T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67737
published_at 2026-04-09T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.6767
published_at 2026-04-02T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67691
published_at 2026-04-04T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67671
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231020
reference_id 2231020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231020
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-38599
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6uck-ed5x-fyga
5
url VCID-71d6-g16a-3qa9
vulnerability_id VCID-71d6-g16a-3qa9
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38133
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.56109
published_at 2026-04-02T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56129
published_at 2026-04-04T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.56108
published_at 2026-04-07T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56159
published_at 2026-04-08T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.56164
published_at 2026-04-09T12:55:00Z
5
value 0.00399
scoring_system epss
scoring_elements 0.60655
published_at 2026-04-13T12:55:00Z
6
value 0.00399
scoring_system epss
scoring_elements 0.6069
published_at 2026-04-11T12:55:00Z
7
value 0.00399
scoring_system epss
scoring_elements 0.60675
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231015
reference_id 2231015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231015
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-38133
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71d6-g16a-3qa9
6
url VCID-7ehr-3myw-g7b1
vulnerability_id VCID-7ehr-3myw-g7b1
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42917
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-13T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2102
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20906
published_at 2026-04-12T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20949
published_at 2026-04-11T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20933
published_at 2026-04-09T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20792
published_at 2026-04-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21076
published_at 2026-04-04T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20872
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42917
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/12/05/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://www.openwall.com/lists/oss-security/2023/12/05/1
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
7
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253058
reference_id 2253058
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253058
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/3
10
reference_url http://seclists.org/fulldisclosure/2024/Jan/35
reference_id 35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2024/Jan/35
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/4
12
reference_url http://seclists.org/fulldisclosure/2023/Dec/5
reference_id 5
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/5
13
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
reference_id AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
15
reference_url https://www.debian.org/security/2023/dsa-5575
reference_id dsa-5575
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://www.debian.org/security/2023/dsa-5575
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://support.apple.com/en-us/HT214031
reference_id HT214031
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214031
18
reference_url https://support.apple.com/en-us/HT214032
reference_id HT214032
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214032
19
reference_url https://support.apple.com/en-us/HT214033
reference_id HT214033
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214033
20
reference_url https://support.apple.com/kb/HT214033
reference_id HT214033
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214033
21
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214034
22
reference_url https://support.apple.com/kb/HT214062
reference_id HT214062
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214062
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
reference_id P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
24
reference_url https://access.redhat.com/errata/RHSA-2023:7715
reference_id RHSA-2023:7715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7715
25
reference_url https://access.redhat.com/errata/RHSA-2023:7716
reference_id RHSA-2023:7716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7716
26
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
27
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
31
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
32
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
33
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6545-1/
reference_id USN-6545-1
reference_type
scores
url https://usn.ubuntu.com/6545-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-42917
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ehr-3myw-g7b1
7
url VCID-a35x-vamv-zyez
vulnerability_id VCID-a35x-vamv-zyez
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32370
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08134
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08164
published_at 2026-04-13T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08192
published_at 2026-04-08T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.0821
published_at 2026-04-09T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08201
published_at 2026-04-11T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08181
published_at 2026-04-12T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08177
published_at 2026-04-04T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url http://www.openwall.com/lists/oss-security/2023/09/11/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/
url http://www.openwall.com/lists/oss-security/2023/09/11/1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238944
reference_id 2238944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238944
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/
url https://support.apple.com/en-us/HT213670
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-32370
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a35x-vamv-zyez
8
url VCID-e5f7-5sx3-27b1
vulnerability_id VCID-e5f7-5sx3-27b1
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42916
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14646
published_at 2026-04-13T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14571
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.147
published_at 2026-04-12T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14738
published_at 2026-04-11T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14593
published_at 2026-04-09T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14451
published_at 2026-04-07T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14641
published_at 2026-04-04T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.1454
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42916
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/12/05/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/12/05/1
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
7
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253054
reference_id 2253054
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253054
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/3
reference_id 3
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/3
10
reference_url http://seclists.org/fulldisclosure/2024/Jan/35
reference_id 35
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2024/Jan/35
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/4
reference_id 4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/4
12
reference_url http://seclists.org/fulldisclosure/2023/Dec/5
reference_id 5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/5
13
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
reference_id AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
15
reference_url https://www.debian.org/security/2023/dsa-5575
reference_id dsa-5575
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://www.debian.org/security/2023/dsa-5575
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://support.apple.com/en-us/HT214031
reference_id HT214031
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214031
18
reference_url https://support.apple.com/en-us/HT214032
reference_id HT214032
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214032
19
reference_url https://support.apple.com/en-us/HT214033
reference_id HT214033
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214033
20
reference_url https://support.apple.com/kb/HT214033
reference_id HT214033
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214033
21
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214034
22
reference_url https://support.apple.com/kb/HT214062
reference_id HT214062
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214062
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
reference_id P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
24
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
25
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/6545-1/
reference_id USN-6545-1
reference_type
scores
url https://usn.ubuntu.com/6545-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-42916
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e5f7-5sx3-27b1
9
url VCID-g4ct-k4dv-s7fs
vulnerability_id VCID-g4ct-k4dv-s7fs
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32393
reference_id
reference_type
scores
0
value 0.00237
scoring_system epss
scoring_elements 0.4681
published_at 2026-04-02T12:55:00Z
1
value 0.00237
scoring_system epss
scoring_elements 0.46829
published_at 2026-04-04T12:55:00Z
2
value 0.00237
scoring_system epss
scoring_elements 0.46778
published_at 2026-04-07T12:55:00Z
3
value 0.00237
scoring_system epss
scoring_elements 0.46833
published_at 2026-04-08T12:55:00Z
4
value 0.00237
scoring_system epss
scoring_elements 0.46832
published_at 2026-04-09T12:55:00Z
5
value 0.00237
scoring_system epss
scoring_elements 0.46855
published_at 2026-04-11T12:55:00Z
6
value 0.00237
scoring_system epss
scoring_elements 0.46827
published_at 2026-04-12T12:55:00Z
7
value 0.00237
scoring_system epss
scoring_elements 0.46834
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224608
reference_id 2224608
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224608
14
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
15
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
16
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-32393
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4ct-k4dv-s7fs
10
url VCID-kbr6-94t1-87hd
vulnerability_id VCID-kbr6-94t1-87hd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28198
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17404
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17451
published_at 2026-04-04T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17233
published_at 2026-04-07T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17325
published_at 2026-04-08T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17384
published_at 2026-04-09T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17396
published_at 2026-04-11T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17346
published_at 2026-04-12T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17288
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238943
reference_id 2238943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238943
14
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-28198
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbr6-94t1-87hd
11
url VCID-kj7n-3mny-wkgr
vulnerability_id VCID-kj7n-3mny-wkgr
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38592
reference_id
reference_type
scores
0
value 0.00583
scoring_system epss
scoring_elements 0.68968
published_at 2026-04-13T12:55:00Z
1
value 0.00583
scoring_system epss
scoring_elements 0.69012
published_at 2026-04-11T12:55:00Z
2
value 0.00583
scoring_system epss
scoring_elements 0.68998
published_at 2026-04-12T12:55:00Z
3
value 0.00727
scoring_system epss
scoring_elements 0.72599
published_at 2026-04-08T12:55:00Z
4
value 0.00727
scoring_system epss
scoring_elements 0.72611
published_at 2026-04-09T12:55:00Z
5
value 0.00727
scoring_system epss
scoring_elements 0.72568
published_at 2026-04-02T12:55:00Z
6
value 0.00727
scoring_system epss
scoring_elements 0.72585
published_at 2026-04-04T12:55:00Z
7
value 0.00727
scoring_system epss
scoring_elements 0.72561
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38592
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231017
reference_id 2231017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231017
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-38592
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kj7n-3mny-wkgr
12
url VCID-n7a4-nphm-ufam
vulnerability_id VCID-n7a4-nphm-ufam
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38611
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-13T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-11T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-12T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.71172
published_at 2026-04-08T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71185
published_at 2026-04-09T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.71138
published_at 2026-04-02T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71155
published_at 2026-04-04T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.7113
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38611
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231022
reference_id 2231022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231022
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-38611
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7a4-nphm-ufam
13
url VCID-q1rs-zvcq-9kbd
vulnerability_id VCID-q1rs-zvcq-9kbd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37450.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37450.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37450
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17077
published_at 2026-04-02T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16925
published_at 2026-04-13T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17131
published_at 2026-04-04T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16908
published_at 2026-04-07T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16997
published_at 2026-04-08T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17055
published_at 2026-04-09T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17031
published_at 2026-04-11T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37450
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2223000
reference_id 2223000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2223000
5
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://security.gentoo.org/glsa/202401-04
6
reference_url https://support.apple.com/en-us/HT213826
reference_id HT213826
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213826
7
reference_url https://support.apple.com/en-us/HT213841
reference_id HT213841
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213841
8
reference_url https://support.apple.com/en-us/HT213843
reference_id HT213843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213843
9
reference_url https://support.apple.com/en-us/HT213846
reference_id HT213846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213846
10
reference_url https://support.apple.com/en-us/HT213848
reference_id HT213848
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213848
11
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
12
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-37450
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q1rs-zvcq-9kbd
14
url VCID-r8td-qqvp-xbbd
vulnerability_id VCID-r8td-qqvp-xbbd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38572
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61626
published_at 2026-04-13T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61657
published_at 2026-04-11T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.61646
published_at 2026-04-12T12:55:00Z
3
value 0.00532
scoring_system epss
scoring_elements 0.673
published_at 2026-04-08T12:55:00Z
4
value 0.00532
scoring_system epss
scoring_elements 0.67313
published_at 2026-04-09T12:55:00Z
5
value 0.00532
scoring_system epss
scoring_elements 0.67246
published_at 2026-04-02T12:55:00Z
6
value 0.00532
scoring_system epss
scoring_elements 0.67271
published_at 2026-04-04T12:55:00Z
7
value 0.00532
scoring_system epss
scoring_elements 0.67248
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38572
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231028
reference_id 2231028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231028
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-38572
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r8td-qqvp-xbbd
15
url VCID-vt3f-hrb1-33cw
vulnerability_id VCID-vt3f-hrb1-33cw
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38594
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.63041
published_at 2026-04-02T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.63069
published_at 2026-04-04T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-07T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63084
published_at 2026-04-08T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63101
published_at 2026-04-09T12:55:00Z
5
value 0.00525
scoring_system epss
scoring_elements 0.6698
published_at 2026-04-13T12:55:00Z
6
value 0.00525
scoring_system epss
scoring_elements 0.67025
published_at 2026-04-11T12:55:00Z
7
value 0.00525
scoring_system epss
scoring_elements 0.67011
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231018
reference_id 2231018
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231018
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
18
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
19
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
20
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-38594
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vt3f-hrb1-33cw
16
url VCID-vwaa-vyn9-d3ey
vulnerability_id VCID-vwaa-vyn9-d3ey
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38595
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-13T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-11T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-12T12:55:00Z
3
value 0.00992
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-08T12:55:00Z
4
value 0.00992
scoring_system epss
scoring_elements 0.76889
published_at 2026-04-09T12:55:00Z
5
value 0.00992
scoring_system epss
scoring_elements 0.76836
published_at 2026-04-02T12:55:00Z
6
value 0.00992
scoring_system epss
scoring_elements 0.76865
published_at 2026-04-04T12:55:00Z
7
value 0.00992
scoring_system epss
scoring_elements 0.76847
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231019
reference_id 2231019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231019
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
19
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-38595
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwaa-vyn9-d3ey
17
url VCID-xqyu-yhx3-f7fq
vulnerability_id VCID-xqyu-yhx3-f7fq
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40397
reference_id
reference_type
scores
0
value 0.01195
scoring_system epss
scoring_elements 0.78835
published_at 2026-04-02T12:55:00Z
1
value 0.01195
scoring_system epss
scoring_elements 0.78864
published_at 2026-04-04T12:55:00Z
2
value 0.01195
scoring_system epss
scoring_elements 0.78846
published_at 2026-04-07T12:55:00Z
3
value 0.01195
scoring_system epss
scoring_elements 0.78871
published_at 2026-04-08T12:55:00Z
4
value 0.01195
scoring_system epss
scoring_elements 0.78877
published_at 2026-04-09T12:55:00Z
5
value 0.01195
scoring_system epss
scoring_elements 0.78901
published_at 2026-04-11T12:55:00Z
6
value 0.01195
scoring_system epss
scoring_elements 0.78885
published_at 2026-04-12T12:55:00Z
7
value 0.01195
scoring_system epss
scoring_elements 0.78875
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40397
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238945
reference_id 2238945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238945
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
22
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
23
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
24
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-40397
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqyu-yhx3-f7fq
18
url VCID-ytw3-vz3r-rqdd
vulnerability_id VCID-ytw3-vz3r-rqdd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32439.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32439
reference_id
reference_type
scores
0
value 0.0116
scoring_system epss
scoring_elements 0.78545
published_at 2026-04-02T12:55:00Z
1
value 0.0116
scoring_system epss
scoring_elements 0.78587
published_at 2026-04-13T12:55:00Z
2
value 0.0116
scoring_system epss
scoring_elements 0.78575
published_at 2026-04-04T12:55:00Z
3
value 0.0116
scoring_system epss
scoring_elements 0.78557
published_at 2026-04-07T12:55:00Z
4
value 0.0116
scoring_system epss
scoring_elements 0.78584
published_at 2026-04-08T12:55:00Z
5
value 0.0116
scoring_system epss
scoring_elements 0.7859
published_at 2026-04-09T12:55:00Z
6
value 0.0116
scoring_system epss
scoring_elements 0.78614
published_at 2026-04-11T12:55:00Z
7
value 0.0116
scoring_system epss
scoring_elements 0.78596
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218640
reference_id 2218640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218640
5
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://security.gentoo.org/glsa/202401-04
6
reference_url https://support.apple.com/en-us/HT213811
reference_id HT213811
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213811
7
reference_url https://support.apple.com/en-us/HT213813
reference_id HT213813
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213813
8
reference_url https://support.apple.com/en-us/HT213814
reference_id HT213814
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213814
9
reference_url https://support.apple.com/kb/HT213814
reference_id HT213814
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/kb/HT213814
10
reference_url https://support.apple.com/en-us/HT213816
reference_id HT213816
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213816
11
reference_url https://support.apple.com/kb/HT213816
reference_id HT213816
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/kb/HT213816
12
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
13
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.3
purl pkg:ebuild/net-libs/webkit-gtk@2.42.3
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3
aliases CVE-2023-32439
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytw3-vz3r-rqdd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.3