Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/webkit2gtk3@2.42.5-1?arch=el9
Typerpm
Namespaceredhat
Namewebkit2gtk3
Version2.42.5-1
Qualifiers
arch el9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-7ehr-3myw-g7b1
vulnerability_id VCID-7ehr-3myw-g7b1
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42917
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20818
published_at 2026-04-21T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2102
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20837
published_at 2026-04-18T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20845
published_at 2026-04-16T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-13T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20906
published_at 2026-04-12T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.20949
published_at 2026-04-11T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20872
published_at 2026-04-08T12:55:00Z
8
value 0.00068
scoring_system epss
scoring_elements 0.20792
published_at 2026-04-07T12:55:00Z
9
value 0.00068
scoring_system epss
scoring_elements 0.21076
published_at 2026-04-04T12:55:00Z
10
value 0.00068
scoring_system epss
scoring_elements 0.20933
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42917
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/12/05/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://www.openwall.com/lists/oss-security/2023/12/05/1
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
7
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253058
reference_id 2253058
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253058
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/3
10
reference_url http://seclists.org/fulldisclosure/2024/Jan/35
reference_id 35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2024/Jan/35
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/4
12
reference_url http://seclists.org/fulldisclosure/2023/Dec/5
reference_id 5
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/5
13
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
reference_id AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
15
reference_url https://www.debian.org/security/2023/dsa-5575
reference_id dsa-5575
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://www.debian.org/security/2023/dsa-5575
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://support.apple.com/en-us/HT214031
reference_id HT214031
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214031
18
reference_url https://support.apple.com/en-us/HT214032
reference_id HT214032
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214032
19
reference_url https://support.apple.com/en-us/HT214033
reference_id HT214033
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214033
20
reference_url https://support.apple.com/kb/HT214033
reference_id HT214033
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214033
21
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214034
22
reference_url https://support.apple.com/kb/HT214062
reference_id HT214062
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214062
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
reference_id P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
24
reference_url https://access.redhat.com/errata/RHSA-2023:7715
reference_id RHSA-2023:7715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7715
25
reference_url https://access.redhat.com/errata/RHSA-2023:7716
reference_id RHSA-2023:7716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7716
26
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
27
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
31
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
32
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
33
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6545-1/
reference_id USN-6545-1
reference_type
scores
url https://usn.ubuntu.com/6545-1/
fixed_packages
aliases CVE-2023-42917
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ehr-3myw-g7b1
1
url VCID-933e-5azn-6yec
vulnerability_id VCID-933e-5azn-6yec
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43000.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43000
reference_id
reference_type
scores
0
value 0.0002
scoring_system epss
scoring_elements 0.05399
published_at 2026-04-21T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18949
published_at 2026-04-04T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18673
published_at 2026-04-07T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18675
published_at 2026-04-18T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18664
published_at 2026-04-16T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18715
published_at 2026-04-13T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18765
published_at 2026-04-12T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18812
published_at 2026-04-11T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18807
published_at 2026-04-09T12:55:00Z
9
value 0.0006
scoring_system epss
scoring_elements 0.18753
published_at 2026-04-08T12:55:00Z
10
value 0.00095
scoring_system epss
scoring_elements 0.26483
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://support.apple.com/en-us/120324
reference_id 120324
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/
url https://support.apple.com/en-us/120324
14
reference_url https://support.apple.com/en-us/120331
reference_id 120331
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/
url https://support.apple.com/en-us/120331
15
reference_url https://support.apple.com/en-us/120338
reference_id 120338
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/
url https://support.apple.com/en-us/120338
16
reference_url https://support.apple.com/en-us/126632
reference_id 126632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/
url https://support.apple.com/en-us/126632
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416324
reference_id 2416324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416324
18
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
19
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
20
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
23
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
24
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
25
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-43000
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-933e-5azn-6yec
2
url VCID-dafx-64dz-ubfw
vulnerability_id VCID-dafx-64dz-ubfw
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41983
reference_id
reference_type
scores
0
value 0.01108
scoring_system epss
scoring_elements 0.78065
published_at 2026-04-02T12:55:00Z
1
value 0.01108
scoring_system epss
scoring_elements 0.78095
published_at 2026-04-04T12:55:00Z
2
value 0.01108
scoring_system epss
scoring_elements 0.78077
published_at 2026-04-07T12:55:00Z
3
value 0.01108
scoring_system epss
scoring_elements 0.78103
published_at 2026-04-08T12:55:00Z
4
value 0.01108
scoring_system epss
scoring_elements 0.78107
published_at 2026-04-09T12:55:00Z
5
value 0.01108
scoring_system epss
scoring_elements 0.78111
published_at 2026-04-13T12:55:00Z
6
value 0.01108
scoring_system epss
scoring_elements 0.78146
published_at 2026-04-18T12:55:00Z
7
value 0.01108
scoring_system epss
scoring_elements 0.78133
published_at 2026-04-11T12:55:00Z
8
value 0.01108
scoring_system epss
scoring_elements 0.78115
published_at 2026-04-12T12:55:00Z
9
value 0.01326
scoring_system epss
scoring_elements 0.7995
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41983
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271453
reference_id 2271453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271453
6
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
7
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
8
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
9
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
10
reference_url https://usn.ubuntu.com/6490-1/
reference_id USN-6490-1
reference_type
scores
url https://usn.ubuntu.com/6490-1/
fixed_packages
aliases CVE-2023-41983
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dafx-64dz-ubfw
3
url VCID-drtd-1c4r-1bbf
vulnerability_id VCID-drtd-1c4r-1bbf
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42970.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42970.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42970
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64491
published_at 2026-04-21T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.64424
published_at 2026-04-02T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.64455
published_at 2026-04-04T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.64414
published_at 2026-04-07T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.64462
published_at 2026-04-08T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.64478
published_at 2026-04-09T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.64494
published_at 2026-04-11T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64481
published_at 2026-04-12T12:55:00Z
8
value 0.00467
scoring_system epss
scoring_elements 0.64453
published_at 2026-04-13T12:55:00Z
9
value 0.00467
scoring_system epss
scoring_elements 0.64487
published_at 2026-04-16T12:55:00Z
10
value 0.00467
scoring_system epss
scoring_elements 0.64499
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42970
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://support.apple.com/en-us/120330
reference_id 120330
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/
url https://support.apple.com/en-us/120330
14
reference_url https://support.apple.com/en-us/120947
reference_id 120947
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/
url https://support.apple.com/en-us/120947
15
reference_url https://support.apple.com/en-us/120948
reference_id 120948
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/
url https://support.apple.com/en-us/120948
16
reference_url https://support.apple.com/en-us/120949
reference_id 120949
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/
url https://support.apple.com/en-us/120949
17
reference_url https://support.apple.com/en-us/120950
reference_id 120950
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/
url https://support.apple.com/en-us/120950
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366498
reference_id 2366498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366498
19
reference_url https://security.archlinux.org/ASA-202505-2
reference_id ASA-202505-2
reference_type
scores
url https://security.archlinux.org/ASA-202505-2
20
reference_url https://security.archlinux.org/ASA-202505-3
reference_id ASA-202505-3
reference_type
scores
url https://security.archlinux.org/ASA-202505-3
21
reference_url https://security.archlinux.org/ASA-202505-4
reference_id ASA-202505-4
reference_type
scores
url https://security.archlinux.org/ASA-202505-4
22
reference_url https://security.archlinux.org/ASA-202505-5
reference_id ASA-202505-5
reference_type
scores
url https://security.archlinux.org/ASA-202505-5
23
reference_url https://security.archlinux.org/AVG-2867
reference_id AVG-2867
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2867
24
reference_url https://security.archlinux.org/AVG-2868
reference_id AVG-2868
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2868
25
reference_url https://security.archlinux.org/AVG-2869
reference_id AVG-2869
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2869
26
reference_url https://security.archlinux.org/AVG-2870
reference_id AVG-2870
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2870
27
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
28
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
29
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
30
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
31
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
32
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
33
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
34
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
35
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-42970
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drtd-1c4r-1bbf
4
url VCID-f8z1-mtxh-1bhz
vulnerability_id VCID-f8z1-mtxh-1bhz
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32359.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32359.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32359
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27686
published_at 2026-04-02T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27724
published_at 2026-04-04T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27514
published_at 2026-04-07T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27583
published_at 2026-04-08T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27625
published_at 2026-04-09T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.2763
published_at 2026-04-11T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27586
published_at 2026-04-12T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27529
published_at 2026-04-13T12:55:00Z
8
value 0.00099
scoring_system epss
scoring_elements 0.27538
published_at 2026-04-16T12:55:00Z
9
value 0.00099
scoring_system epss
scoring_elements 0.27511
published_at 2026-04-18T12:55:00Z
10
value 0.00099
scoring_system epss
scoring_elements 0.27472
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32359
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271449
reference_id 2271449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271449
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
16
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-32359
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8z1-mtxh-1bhz
5
url VCID-kbzp-1gvm-b3ex
vulnerability_id VCID-kbzp-1gvm-b3ex
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40414.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40414
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.36335
published_at 2026-04-02T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.36191
published_at 2026-04-21T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.36368
published_at 2026-04-04T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.36203
published_at 2026-04-07T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.36252
published_at 2026-04-08T12:55:00Z
5
value 0.00155
scoring_system epss
scoring_elements 0.36271
published_at 2026-04-09T12:55:00Z
6
value 0.00155
scoring_system epss
scoring_elements 0.36276
published_at 2026-04-11T12:55:00Z
7
value 0.00155
scoring_system epss
scoring_elements 0.36239
published_at 2026-04-12T12:55:00Z
8
value 0.00155
scoring_system epss
scoring_elements 0.36215
published_at 2026-04-13T12:55:00Z
9
value 0.00155
scoring_system epss
scoring_elements 0.36258
published_at 2026-04-16T12:55:00Z
10
value 0.00155
scoring_system epss
scoring_elements 0.36242
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40414
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270143
reference_id 2270143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270143
14
reference_url http://www.openwall.com/lists/oss-security/2024/02/05/8
reference_id 8
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url http://www.openwall.com/lists/oss-security/2024/02/05/8
15
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
16
reference_url https://support.apple.com/en-us/HT213936
reference_id HT213936
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url https://support.apple.com/en-us/HT213936
17
reference_url https://support.apple.com/en-us/HT213937
reference_id HT213937
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url https://support.apple.com/en-us/HT213937
18
reference_url https://support.apple.com/en-us/HT213938
reference_id HT213938
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url https://support.apple.com/en-us/HT213938
19
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url https://support.apple.com/en-us/HT213940
20
reference_url https://support.apple.com/en-us/HT213941
reference_id HT213941
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url https://support.apple.com/en-us/HT213941
21
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
22
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-40414
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbzp-1gvm-b3ex
6
url VCID-mvm2-2uz9-bufg
vulnerability_id VCID-mvm2-2uz9-bufg
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42875.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42875
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52378
published_at 2026-04-21T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.52292
published_at 2026-04-02T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52319
published_at 2026-04-04T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.52282
published_at 2026-04-07T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52335
published_at 2026-04-08T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.5233
published_at 2026-04-09T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.5238
published_at 2026-04-11T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52365
published_at 2026-04-12T12:55:00Z
8
value 0.00289
scoring_system epss
scoring_elements 0.52351
published_at 2026-04-13T12:55:00Z
9
value 0.00289
scoring_system epss
scoring_elements 0.52389
published_at 2026-04-16T12:55:00Z
10
value 0.00289
scoring_system epss
scoring_elements 0.52395
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42875
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://support.apple.com/en-us/120330
reference_id 120330
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/
url https://support.apple.com/en-us/120330
14
reference_url https://support.apple.com/en-us/120947
reference_id 120947
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/
url https://support.apple.com/en-us/120947
15
reference_url https://support.apple.com/en-us/120948
reference_id 120948
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/
url https://support.apple.com/en-us/120948
16
reference_url https://support.apple.com/en-us/120949
reference_id 120949
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/
url https://support.apple.com/en-us/120949
17
reference_url https://support.apple.com/en-us/120950
reference_id 120950
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/
url https://support.apple.com/en-us/120950
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366497
reference_id 2366497
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366497
19
reference_url https://security.archlinux.org/ASA-202505-2
reference_id ASA-202505-2
reference_type
scores
url https://security.archlinux.org/ASA-202505-2
20
reference_url https://security.archlinux.org/ASA-202505-3
reference_id ASA-202505-3
reference_type
scores
url https://security.archlinux.org/ASA-202505-3
21
reference_url https://security.archlinux.org/ASA-202505-4
reference_id ASA-202505-4
reference_type
scores
url https://security.archlinux.org/ASA-202505-4
22
reference_url https://security.archlinux.org/ASA-202505-5
reference_id ASA-202505-5
reference_type
scores
url https://security.archlinux.org/ASA-202505-5
23
reference_url https://security.archlinux.org/AVG-2867
reference_id AVG-2867
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2867
24
reference_url https://security.archlinux.org/AVG-2868
reference_id AVG-2868
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2868
25
reference_url https://security.archlinux.org/AVG-2869
reference_id AVG-2869
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2869
26
reference_url https://security.archlinux.org/AVG-2870
reference_id AVG-2870
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2870
27
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
28
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
29
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
30
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
31
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
32
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
33
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
34
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
35
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-42875
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mvm2-2uz9-bufg
7
url VCID-r25x-h5yu-quc1
vulnerability_id VCID-r25x-h5yu-quc1
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42890.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42890
reference_id
reference_type
scores
0
value 0.00402
scoring_system epss
scoring_elements 0.60742
published_at 2026-04-02T12:55:00Z
1
value 0.00402
scoring_system epss
scoring_elements 0.60821
published_at 2026-04-21T12:55:00Z
2
value 0.00402
scoring_system epss
scoring_elements 0.60771
published_at 2026-04-04T12:55:00Z
3
value 0.00402
scoring_system epss
scoring_elements 0.60735
published_at 2026-04-07T12:55:00Z
4
value 0.00402
scoring_system epss
scoring_elements 0.60784
published_at 2026-04-08T12:55:00Z
5
value 0.00402
scoring_system epss
scoring_elements 0.60799
published_at 2026-04-09T12:55:00Z
6
value 0.00402
scoring_system epss
scoring_elements 0.6082
published_at 2026-04-11T12:55:00Z
7
value 0.00402
scoring_system epss
scoring_elements 0.60807
published_at 2026-04-12T12:55:00Z
8
value 0.00402
scoring_system epss
scoring_elements 0.60789
published_at 2026-04-13T12:55:00Z
9
value 0.00402
scoring_system epss
scoring_elements 0.60831
published_at 2026-04-16T12:55:00Z
10
value 0.00402
scoring_system epss
scoring_elements 0.60837
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42890
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url http://www.openwall.com/lists/oss-security/2023/12/18/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://www.openwall.com/lists/oss-security/2023/12/18/1
14
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
15
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254327
reference_id 2254327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254327
17
reference_url http://seclists.org/fulldisclosure/2023/Dec/6
reference_id 6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/6
18
reference_url http://seclists.org/fulldisclosure/2023/Dec/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/7
19
reference_url http://seclists.org/fulldisclosure/2023/Dec/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/9
20
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://security.gentoo.org/glsa/202401-33
21
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214035
22
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214036
23
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214039
24
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/kb/HT214039
25
reference_url https://support.apple.com/en-us/HT214040
reference_id HT214040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214040
26
reference_url https://support.apple.com/en-us/HT214041
reference_id HT214041
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214041
27
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
28
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-42890
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r25x-h5yu-quc1
8
url VCID-vh6y-51ne-cuhh
vulnerability_id VCID-vh6y-51ne-cuhh
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1745.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1745
reference_id
reference_type
scores
0
value 0.00802
scoring_system epss
scoring_elements 0.7414
published_at 2026-04-18T12:55:00Z
1
value 0.00802
scoring_system epss
scoring_elements 0.74045
published_at 2026-04-01T12:55:00Z
2
value 0.00802
scoring_system epss
scoring_elements 0.74051
published_at 2026-04-02T12:55:00Z
3
value 0.00802
scoring_system epss
scoring_elements 0.74077
published_at 2026-04-04T12:55:00Z
4
value 0.00802
scoring_system epss
scoring_elements 0.74048
published_at 2026-04-07T12:55:00Z
5
value 0.00802
scoring_system epss
scoring_elements 0.74081
published_at 2026-04-08T12:55:00Z
6
value 0.00802
scoring_system epss
scoring_elements 0.74096
published_at 2026-04-09T12:55:00Z
7
value 0.00802
scoring_system epss
scoring_elements 0.74117
published_at 2026-04-11T12:55:00Z
8
value 0.00802
scoring_system epss
scoring_elements 0.74099
published_at 2026-04-12T12:55:00Z
9
value 0.00802
scoring_system epss
scoring_elements 0.74093
published_at 2026-04-13T12:55:00Z
10
value 0.00802
scoring_system epss
scoring_elements 0.74131
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1743
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1744
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1746
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1747
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1749
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3152
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3803
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.securitytracker.com/id/1030270
reference_id 1030270
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://www.securitytracker.com/id/1030270
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270151
reference_id 2270151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270151
23
reference_url http://secunia.com/advisories/58920
reference_id 58920
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://secunia.com/advisories/58920
24
reference_url http://secunia.com/advisories/59155
reference_id 59155
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://secunia.com/advisories/59155
25
reference_url http://www.openwall.com/lists/oss-security/2024/02/05/8
reference_id 8
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://www.openwall.com/lists/oss-security/2024/02/05/8
26
reference_url https://src.chromium.org/viewvc/blink?revision=167993&view=revision
reference_id blink?revision=167993&view=revision
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url https://src.chromium.org/viewvc/blink?revision=167993&view=revision
27
reference_url https://code.google.com/p/chromium/issues/detail?id=346192
reference_id detail?id=346192
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url https://code.google.com/p/chromium/issues/detail?id=346192
28
reference_url http://www.debian.org/security/2014/dsa-2939
reference_id dsa-2939
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://www.debian.org/security/2014/dsa-2939
29
reference_url https://security.gentoo.org/glsa/201408-16
reference_id GLSA-201408-16
reference_type
scores
url https://security.gentoo.org/glsa/201408-16
30
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
31
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
32
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
33
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
reference_id stable-channel-update_20.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
fixed_packages
aliases CVE-2014-1745
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh6y-51ne-cuhh
9
url VCID-wn9z-vusf-yycn
vulnerability_id VCID-wn9z-vusf-yycn
summary webkitgtk: processing a malicious image may lead to a denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42883.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42883
reference_id
reference_type
scores
0
value 0.00021
scoring_system epss
scoring_elements 0.05643
published_at 2026-04-21T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.05938
published_at 2026-04-02T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.05981
published_at 2026-04-18T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.06004
published_at 2026-04-13T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.06013
published_at 2026-04-12T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.06021
published_at 2026-04-11T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.06031
published_at 2026-04-09T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.05993
published_at 2026-04-08T12:55:00Z
8
value 0.00022
scoring_system epss
scoring_elements 0.05954
published_at 2026-04-07T12:55:00Z
9
value 0.00022
scoring_system epss
scoring_elements 0.0597
published_at 2026-04-16T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42883
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2023/12/18/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://www.openwall.com/lists/oss-security/2023/12/18/1
5
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254326
reference_id 2254326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254326
8
reference_url http://seclists.org/fulldisclosure/2023/Dec/6
reference_id 6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/6
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/7
10
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/9
12
reference_url https://www.debian.org/security/2023/dsa-5580
reference_id dsa-5580
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://www.debian.org/security/2023/dsa-5580
13
reference_url https://support.apple.com/en-us/HT214034
reference_id HT214034
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214034
14
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/kb/HT214034
15
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214035
16
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214036
17
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214039
18
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/kb/HT214039
19
reference_url https://support.apple.com/en-us/HT214040
reference_id HT214040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214040
20
reference_url https://support.apple.com/en-us/HT214041
reference_id HT214041
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214041
21
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
22
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/6582-1/
reference_id USN-6582-1
reference_type
scores
url https://usn.ubuntu.com/6582-1/
fixed_packages
aliases CVE-2023-42883
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wn9z-vusf-yycn
10
url VCID-x25m-k9px-2ubs
vulnerability_id VCID-x25m-k9px-2ubs
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39928.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39928
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.38955
published_at 2026-04-02T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38974
published_at 2026-04-04T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.38904
published_at 2026-04-07T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.38957
published_at 2026-04-08T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.38971
published_at 2026-04-09T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.38983
published_at 2026-04-11T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.38945
published_at 2026-04-18T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.38918
published_at 2026-04-13T12:55:00Z
8
value 0.00175
scoring_system epss
scoring_elements 0.38965
published_at 2026-04-16T12:55:00Z
9
value 0.00175
scoring_system epss
scoring_elements 0.38864
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39928
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241400
reference_id 2241400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241400
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
16
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/6426-1/
reference_id USN-6426-1
reference_type
scores
url https://usn.ubuntu.com/6426-1/
fixed_packages
aliases CVE-2023-39928
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x25m-k9px-2ubs
11
url VCID-x73g-k7yh-qydd
vulnerability_id VCID-x73g-k7yh-qydd
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42852
reference_id
reference_type
scores
0
value 0.02171
scoring_system epss
scoring_elements 0.84346
published_at 2026-04-21T12:55:00Z
1
value 0.02171
scoring_system epss
scoring_elements 0.84267
published_at 2026-04-02T12:55:00Z
2
value 0.02171
scoring_system epss
scoring_elements 0.84344
published_at 2026-04-18T12:55:00Z
3
value 0.02171
scoring_system epss
scoring_elements 0.84343
published_at 2026-04-16T12:55:00Z
4
value 0.02171
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-13T12:55:00Z
5
value 0.02171
scoring_system epss
scoring_elements 0.84325
published_at 2026-04-12T12:55:00Z
6
value 0.02171
scoring_system epss
scoring_elements 0.84332
published_at 2026-04-11T12:55:00Z
7
value 0.02171
scoring_system epss
scoring_elements 0.84314
published_at 2026-04-09T12:55:00Z
8
value 0.02171
scoring_system epss
scoring_elements 0.84309
published_at 2026-04-08T12:55:00Z
9
value 0.02171
scoring_system epss
scoring_elements 0.84287
published_at 2026-04-07T12:55:00Z
10
value 0.02171
scoring_system epss
scoring_elements 0.84286
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/11/15/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://www.openwall.com/lists/oss-security/2023/11/15/1
6
reference_url http://seclists.org/fulldisclosure/2023/Oct/19
reference_id 19
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/19
7
reference_url http://seclists.org/fulldisclosure/2023/Oct/22
reference_id 22
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/22
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271456
reference_id 2271456
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271456
9
reference_url http://seclists.org/fulldisclosure/2023/Oct/23
reference_id 23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/23
10
reference_url http://seclists.org/fulldisclosure/2023/Oct/24
reference_id 24
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/24
11
reference_url http://seclists.org/fulldisclosure/2023/Oct/25
reference_id 25
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/25
12
reference_url http://seclists.org/fulldisclosure/2023/Oct/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/27
13
reference_url https://www.debian.org/security/2023/dsa-5557
reference_id dsa-5557
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://www.debian.org/security/2023/dsa-5557
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://support.apple.com/en-us/HT213981
reference_id HT213981
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213981
16
reference_url https://support.apple.com/en-us/HT213982
reference_id HT213982
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213982
17
reference_url https://support.apple.com/en-us/HT213984
reference_id HT213984
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213984
18
reference_url https://support.apple.com/kb/HT213984
reference_id HT213984
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/kb/HT213984
19
reference_url https://support.apple.com/en-us/HT213986
reference_id HT213986
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213986
20
reference_url https://support.apple.com/en-us/HT213987
reference_id HT213987
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213987
21
reference_url https://support.apple.com/en-us/HT213988
reference_id HT213988
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213988
22
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
23
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
24
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
25
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
26
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
27
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
28
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
29
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
30
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/
reference_id RPPMOWFYZODONTA3RLZOKSGNR4DELGG2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/
reference_id S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/
33
reference_url https://usn.ubuntu.com/6490-1/
reference_id USN-6490-1
reference_type
scores
url https://usn.ubuntu.com/6490-1/
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/
reference_id ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/
fixed_packages
aliases CVE-2023-42852
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x73g-k7yh-qydd
12
url VCID-ydxt-4h1z-1kh8
vulnerability_id VCID-ydxt-4h1z-1kh8
summary webkitgtk: A malicious website may cause unexpected cross-origin behavior
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23271.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23271.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23271
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20254
published_at 2026-04-02T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.2455
published_at 2026-04-16T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.24538
published_at 2026-04-13T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24593
published_at 2026-04-12T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24636
published_at 2026-04-11T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24619
published_at 2026-04-09T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24502
published_at 2026-04-07T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.2473
published_at 2026-04-04T12:55:00Z
8
value 0.00084
scoring_system epss
scoring_elements 0.24573
published_at 2026-04-08T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24542
published_at 2026-04-18T12:55:00Z
10
value 0.00098
scoring_system epss
scoring_elements 0.2688
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23271
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120304
reference_id 120304
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120304
8
reference_url https://support.apple.com/en-us/120306
reference_id 120306
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120306
9
reference_url https://support.apple.com/en-us/120309
reference_id 120309
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120309
10
reference_url https://support.apple.com/en-us/120311
reference_id 120311
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120311
11
reference_url https://support.apple.com/en-us/120339
reference_id 120339
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120339
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314696
reference_id 2314696
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314696
13
reference_url https://support.apple.com/en-us/HT214055
reference_id HT214055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214055
14
reference_url https://support.apple.com/kb/HT214055
reference_id HT214055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214055
15
reference_url https://support.apple.com/en-us/HT214056
reference_id HT214056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214056
16
reference_url https://support.apple.com/kb/HT214056
reference_id HT214056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214056
17
reference_url https://support.apple.com/en-us/HT214059
reference_id HT214059
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214059
18
reference_url https://support.apple.com/kb/HT214059
reference_id HT214059
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214059
19
reference_url https://support.apple.com/en-us/HT214060
reference_id HT214060
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214060
20
reference_url https://support.apple.com/kb/HT214060
reference_id HT214060
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214060
21
reference_url https://support.apple.com/en-us/HT214061
reference_id HT214061
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214061
22
reference_url https://support.apple.com/kb/HT214061
reference_id HT214061
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214061
23
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
24
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-23271
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ydxt-4h1z-1kh8
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.42.5-1%3Farch=el9