Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2?arch=3
Typerpm
Namespaceredhat
Namewebkit2gtk3
Version2.38.5-1.el9_2
Qualifiers
arch 3
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1e6d-p4fv-rubk
vulnerability_id VCID-1e6d-p4fv-rubk
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27808
reference_id
reference_type
scores
0
value 0.00822
scoring_system epss
scoring_elements 0.74491
published_at 2026-04-24T12:55:00Z
1
value 0.00822
scoring_system epss
scoring_elements 0.74404
published_at 2026-04-04T12:55:00Z
2
value 0.00822
scoring_system epss
scoring_elements 0.74379
published_at 2026-04-07T12:55:00Z
3
value 0.00822
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-08T12:55:00Z
4
value 0.00822
scoring_system epss
scoring_elements 0.74427
published_at 2026-04-09T12:55:00Z
5
value 0.00822
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-11T12:55:00Z
6
value 0.00822
scoring_system epss
scoring_elements 0.74429
published_at 2026-04-12T12:55:00Z
7
value 0.00822
scoring_system epss
scoring_elements 0.7442
published_at 2026-04-13T12:55:00Z
8
value 0.00822
scoring_system epss
scoring_elements 0.74457
published_at 2026-04-16T12:55:00Z
9
value 0.00822
scoring_system epss
scoring_elements 0.74466
published_at 2026-04-18T12:55:00Z
10
value 0.00822
scoring_system epss
scoring_elements 0.74456
published_at 2026-04-21T12:55:00Z
11
value 0.01092
scoring_system epss
scoring_elements 0.77899
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120901
9
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120902
10
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120903
11
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120905
12
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120906
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314697
reference_id 2314697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314697
14
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
15
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214101
16
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214102
17
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214103
18
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214104
19
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214106
20
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214108
21
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
22
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
23
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
24
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
25
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
26
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
27
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
28
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-27808
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6d-p4fv-rubk
1
url VCID-6xkn-7q6s-5fey
vulnerability_id VCID-6xkn-7q6s-5fey
summary webkit: pointer authentication bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27834
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00824
published_at 2026-04-24T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00822
published_at 2026-04-21T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00701
published_at 2026-04-07T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00777
published_at 2026-04-18T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00773
published_at 2026-04-16T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00772
published_at 2026-04-12T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00778
published_at 2026-04-11T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00784
published_at 2026-04-09T12:55:00Z
8
value 8e-05
scoring_system epss
scoring_elements 0.00788
published_at 2026-04-08T12:55:00Z
9
value 8e-05
scoring_system epss
scoring_elements 0.00697
published_at 2026-04-04T12:55:00Z
10
value 8e-05
scoring_system epss
scoring_elements 0.00702
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2024/05/21/1
reference_id 1
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://www.openwall.com/lists/oss-security/2024/05/21/1
8
reference_url http://seclists.org/fulldisclosure/2024/May/10
reference_id 10
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/10
9
reference_url http://seclists.org/fulldisclosure/2024/May/12
reference_id 12
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/12
10
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120896
11
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120898
12
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120901
13
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120902
14
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120903
15
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120905
16
reference_url http://seclists.org/fulldisclosure/2024/May/16
reference_id 16
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/16
17
reference_url http://seclists.org/fulldisclosure/2024/May/17
reference_id 17
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/17
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282412
reference_id 2282412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282412
19
reference_url http://seclists.org/fulldisclosure/2024/May/9
reference_id 9
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/9
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/
reference_id ADCLQW54XN37VJZNYD3UKCYATJFIMYXG
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/
21
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214101
22
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214102
23
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214103
24
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214104
25
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214106
26
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
27
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
28
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
30
reference_url https://usn.ubuntu.com/6788-1/
reference_id USN-6788-1
reference_type
scores
url https://usn.ubuntu.com/6788-1/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/
reference_id WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/
fixed_packages
aliases CVE-2024-27834
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xkn-7q6s-5fey
2
url VCID-br5g-pfa4-33h7
vulnerability_id VCID-br5g-pfa4-33h7
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41074.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41074
reference_id
reference_type
scores
0
value 0.01121
scoring_system epss
scoring_elements 0.78197
published_at 2026-04-02T12:55:00Z
1
value 0.01121
scoring_system epss
scoring_elements 0.78228
published_at 2026-04-04T12:55:00Z
2
value 0.01121
scoring_system epss
scoring_elements 0.78209
published_at 2026-04-07T12:55:00Z
3
value 0.01121
scoring_system epss
scoring_elements 0.78236
published_at 2026-04-08T12:55:00Z
4
value 0.01121
scoring_system epss
scoring_elements 0.78241
published_at 2026-04-09T12:55:00Z
5
value 0.01121
scoring_system epss
scoring_elements 0.78267
published_at 2026-04-11T12:55:00Z
6
value 0.01121
scoring_system epss
scoring_elements 0.7825
published_at 2026-04-12T12:55:00Z
7
value 0.01121
scoring_system epss
scoring_elements 0.78245
published_at 2026-04-13T12:55:00Z
8
value 0.01121
scoring_system epss
scoring_elements 0.78277
published_at 2026-04-16T12:55:00Z
9
value 0.01121
scoring_system epss
scoring_elements 0.78274
published_at 2026-04-18T12:55:00Z
10
value 0.01121
scoring_system epss
scoring_elements 0.78271
published_at 2026-04-21T12:55:00Z
11
value 0.01121
scoring_system epss
scoring_elements 0.78304
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241412
reference_id 2241412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241412
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/6426-1/
reference_id USN-6426-1
reference_type
scores
url https://usn.ubuntu.com/6426-1/
fixed_packages
aliases CVE-2023-41074
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-br5g-pfa4-33h7
3
url VCID-c4np-b4zq-tkch
vulnerability_id VCID-c4np-b4zq-tkch
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31204
reference_id
reference_type
scores
0
value 0.00666
scoring_system epss
scoring_elements 0.71312
published_at 2026-04-24T12:55:00Z
1
value 0.00666
scoring_system epss
scoring_elements 0.71188
published_at 2026-04-02T12:55:00Z
2
value 0.00666
scoring_system epss
scoring_elements 0.71206
published_at 2026-04-04T12:55:00Z
3
value 0.00666
scoring_system epss
scoring_elements 0.71181
published_at 2026-04-07T12:55:00Z
4
value 0.00666
scoring_system epss
scoring_elements 0.71223
published_at 2026-04-08T12:55:00Z
5
value 0.00666
scoring_system epss
scoring_elements 0.71237
published_at 2026-04-09T12:55:00Z
6
value 0.00666
scoring_system epss
scoring_elements 0.7126
published_at 2026-04-11T12:55:00Z
7
value 0.00666
scoring_system epss
scoring_elements 0.71245
published_at 2026-04-12T12:55:00Z
8
value 0.00666
scoring_system epss
scoring_elements 0.71229
published_at 2026-04-13T12:55:00Z
9
value 0.00666
scoring_system epss
scoring_elements 0.71275
published_at 2026-04-16T12:55:00Z
10
value 0.00666
scoring_system epss
scoring_elements 0.71282
published_at 2026-04-18T12:55:00Z
11
value 0.00666
scoring_system epss
scoring_elements 0.71258
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366500
reference_id 2366500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366500
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
aliases CVE-2025-31204
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4np-b4zq-tkch
4
url VCID-c9mb-24v2-q3ba
vulnerability_id VCID-c9mb-24v2-q3ba
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31215
reference_id
reference_type
scores
0
value 0.01121
scoring_system epss
scoring_elements 0.78309
published_at 2026-04-24T12:55:00Z
1
value 0.01121
scoring_system epss
scoring_elements 0.78203
published_at 2026-04-02T12:55:00Z
2
value 0.01121
scoring_system epss
scoring_elements 0.78233
published_at 2026-04-04T12:55:00Z
3
value 0.01121
scoring_system epss
scoring_elements 0.78215
published_at 2026-04-07T12:55:00Z
4
value 0.01121
scoring_system epss
scoring_elements 0.78242
published_at 2026-04-08T12:55:00Z
5
value 0.01121
scoring_system epss
scoring_elements 0.78247
published_at 2026-04-09T12:55:00Z
6
value 0.01121
scoring_system epss
scoring_elements 0.78272
published_at 2026-04-11T12:55:00Z
7
value 0.01121
scoring_system epss
scoring_elements 0.78256
published_at 2026-04-12T12:55:00Z
8
value 0.01121
scoring_system epss
scoring_elements 0.78251
published_at 2026-04-13T12:55:00Z
9
value 0.01121
scoring_system epss
scoring_elements 0.78282
published_at 2026-04-16T12:55:00Z
10
value 0.01121
scoring_system epss
scoring_elements 0.7828
published_at 2026-04-18T12:55:00Z
11
value 0.01121
scoring_system epss
scoring_elements 0.78276
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31215
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366503
reference_id 2366503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366503
12
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
13
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
14
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
15
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
19
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
20
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
21
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
aliases CVE-2025-31215
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mb-24v2-q3ba
5
url VCID-dxsm-nf4f-yfe4
vulnerability_id VCID-dxsm-nf4f-yfe4
summary webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27833
reference_id
reference_type
scores
0
value 0.01223
scoring_system epss
scoring_elements 0.79162
published_at 2026-04-24T12:55:00Z
1
value 0.01223
scoring_system epss
scoring_elements 0.79087
published_at 2026-04-04T12:55:00Z
2
value 0.01223
scoring_system epss
scoring_elements 0.79072
published_at 2026-04-07T12:55:00Z
3
value 0.01223
scoring_system epss
scoring_elements 0.79097
published_at 2026-04-08T12:55:00Z
4
value 0.01223
scoring_system epss
scoring_elements 0.79104
published_at 2026-04-09T12:55:00Z
5
value 0.01223
scoring_system epss
scoring_elements 0.79128
published_at 2026-04-11T12:55:00Z
6
value 0.01223
scoring_system epss
scoring_elements 0.79115
published_at 2026-04-12T12:55:00Z
7
value 0.01223
scoring_system epss
scoring_elements 0.79105
published_at 2026-04-13T12:55:00Z
8
value 0.01223
scoring_system epss
scoring_elements 0.79133
published_at 2026-04-16T12:55:00Z
9
value 0.01223
scoring_system epss
scoring_elements 0.7913
published_at 2026-04-18T12:55:00Z
10
value 0.01223
scoring_system epss
scoring_elements 0.79129
published_at 2026-04-21T12:55:00Z
11
value 0.01652
scoring_system epss
scoring_elements 0.81967
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27833
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120898
9
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120901
10
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120905
11
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120906
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314700
reference_id 2314700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314700
13
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
14
reference_url https://support.apple.com/en-us/HT214100
reference_id HT214100
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214100
15
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214101
16
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214102
17
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214103
18
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214108
19
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
20
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
23
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
24
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
25
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
26
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-27833
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxsm-nf4f-yfe4
6
url VCID-e5f7-5sx3-27b1
vulnerability_id VCID-e5f7-5sx3-27b1
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42916
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14435
published_at 2026-04-24T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14571
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14407
published_at 2026-04-21T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14545
published_at 2026-04-18T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14539
published_at 2026-04-16T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14646
published_at 2026-04-13T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.147
published_at 2026-04-12T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.14593
published_at 2026-04-09T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.1454
published_at 2026-04-08T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14451
published_at 2026-04-07T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14641
published_at 2026-04-04T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14738
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42916
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/12/05/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/12/05/1
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
7
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253054
reference_id 2253054
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253054
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/3
reference_id 3
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/3
10
reference_url http://seclists.org/fulldisclosure/2024/Jan/35
reference_id 35
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2024/Jan/35
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/4
reference_id 4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/4
12
reference_url http://seclists.org/fulldisclosure/2023/Dec/5
reference_id 5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/5
13
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
reference_id AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
15
reference_url https://www.debian.org/security/2023/dsa-5575
reference_id dsa-5575
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://www.debian.org/security/2023/dsa-5575
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://support.apple.com/en-us/HT214031
reference_id HT214031
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214031
18
reference_url https://support.apple.com/en-us/HT214032
reference_id HT214032
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214032
19
reference_url https://support.apple.com/en-us/HT214033
reference_id HT214033
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214033
20
reference_url https://support.apple.com/kb/HT214033
reference_id HT214033
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214033
21
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214034
22
reference_url https://support.apple.com/kb/HT214062
reference_id HT214062
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214062
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
reference_id P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
24
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
25
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/6545-1/
reference_id USN-6545-1
reference_type
scores
url https://usn.ubuntu.com/6545-1/
fixed_packages
aliases CVE-2023-42916
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e5f7-5sx3-27b1
7
url VCID-ey9n-zksh-mbfm
vulnerability_id VCID-ey9n-zksh-mbfm
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31206
reference_id
reference_type
scores
0
value 0.01111
scoring_system epss
scoring_elements 0.7821
published_at 2026-04-24T12:55:00Z
1
value 0.01111
scoring_system epss
scoring_elements 0.78103
published_at 2026-04-02T12:55:00Z
2
value 0.01111
scoring_system epss
scoring_elements 0.78133
published_at 2026-04-04T12:55:00Z
3
value 0.01111
scoring_system epss
scoring_elements 0.78116
published_at 2026-04-07T12:55:00Z
4
value 0.01111
scoring_system epss
scoring_elements 0.78142
published_at 2026-04-08T12:55:00Z
5
value 0.01111
scoring_system epss
scoring_elements 0.78148
published_at 2026-04-09T12:55:00Z
6
value 0.01111
scoring_system epss
scoring_elements 0.78173
published_at 2026-04-11T12:55:00Z
7
value 0.01111
scoring_system epss
scoring_elements 0.78155
published_at 2026-04-12T12:55:00Z
8
value 0.01111
scoring_system epss
scoring_elements 0.78151
published_at 2026-04-13T12:55:00Z
9
value 0.01111
scoring_system epss
scoring_elements 0.78184
published_at 2026-04-16T12:55:00Z
10
value 0.01111
scoring_system epss
scoring_elements 0.78183
published_at 2026-04-18T12:55:00Z
11
value 0.01111
scoring_system epss
scoring_elements 0.78178
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366502
reference_id 2366502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366502
12
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
13
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
14
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
15
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
19
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
20
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
21
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
aliases CVE-2025-31206
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ey9n-zksh-mbfm
8
url VCID-g2uh-tzx9-bqc7
vulnerability_id VCID-g2uh-tzx9-bqc7
summary webkitgtk: Processing web content may lead to a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54658
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39859
published_at 2026-04-02T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39882
published_at 2026-04-04T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40467
published_at 2026-04-08T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40416
published_at 2026-04-07T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.4353
published_at 2026-04-24T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.44295
published_at 2026-04-09T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44329
published_at 2026-04-18T12:55:00Z
7
value 0.00217
scoring_system epss
scoring_elements 0.44338
published_at 2026-04-16T12:55:00Z
8
value 0.00217
scoring_system epss
scoring_elements 0.4428
published_at 2026-04-13T12:55:00Z
9
value 0.00217
scoring_system epss
scoring_elements 0.44313
published_at 2026-04-11T12:55:00Z
10
value 0.00217
scoring_system epss
scoring_elements 0.44257
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54658
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120881
13
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120882
14
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120883
15
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120893
16
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120894
17
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120895
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344946
reference_id 2344946
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344946
19
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
20
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-54658
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2uh-tzx9-bqc7
9
url VCID-kbr6-94t1-87hd
vulnerability_id VCID-kbr6-94t1-87hd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28198
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17404
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17451
published_at 2026-04-04T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17233
published_at 2026-04-18T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17325
published_at 2026-04-08T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17384
published_at 2026-04-09T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17396
published_at 2026-04-11T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17346
published_at 2026-04-12T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17288
published_at 2026-04-13T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17227
published_at 2026-04-16T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17267
published_at 2026-04-21T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17172
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238943
reference_id 2238943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238943
14
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-28198
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbr6-94t1-87hd
10
url VCID-kdvu-rhgt-xqat
vulnerability_id VCID-kdvu-rhgt-xqat
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24223
reference_id
reference_type
scores
0
value 0.0023
scoring_system epss
scoring_elements 0.45777
published_at 2026-04-24T12:55:00Z
1
value 0.0023
scoring_system epss
scoring_elements 0.45831
published_at 2026-04-02T12:55:00Z
2
value 0.0023
scoring_system epss
scoring_elements 0.45853
published_at 2026-04-04T12:55:00Z
3
value 0.0023
scoring_system epss
scoring_elements 0.45803
published_at 2026-04-07T12:55:00Z
4
value 0.0023
scoring_system epss
scoring_elements 0.45859
published_at 2026-04-08T12:55:00Z
5
value 0.0023
scoring_system epss
scoring_elements 0.45856
published_at 2026-04-09T12:55:00Z
6
value 0.0023
scoring_system epss
scoring_elements 0.45878
published_at 2026-04-11T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.45848
published_at 2026-04-12T12:55:00Z
8
value 0.0023
scoring_system epss
scoring_elements 0.45855
published_at 2026-04-13T12:55:00Z
9
value 0.0023
scoring_system epss
scoring_elements 0.45908
published_at 2026-04-16T12:55:00Z
10
value 0.0023
scoring_system epss
scoring_elements 0.45902
published_at 2026-04-18T12:55:00Z
11
value 0.0023
scoring_system epss
scoring_elements 0.45847
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24223
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366499
reference_id 2366499
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366499
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
aliases CVE-2025-24223
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdvu-rhgt-xqat
11
url VCID-nhy8-sfpr-eudu
vulnerability_id VCID-nhy8-sfpr-eudu
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35074.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-35074
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69341
published_at 2026-04-02T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69481
published_at 2026-04-24T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69358
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69338
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69388
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69404
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69427
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69411
published_at 2026-04-12T12:55:00Z
8
value 0.00598
scoring_system epss
scoring_elements 0.69398
published_at 2026-04-13T12:55:00Z
9
value 0.00598
scoring_system epss
scoring_elements 0.69437
published_at 2026-04-16T12:55:00Z
10
value 0.00598
scoring_system epss
scoring_elements 0.69447
published_at 2026-04-18T12:55:00Z
11
value 0.00598
scoring_system epss
scoring_elements 0.69429
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-35074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url http://seclists.org/fulldisclosure/2023/Oct/10
reference_id 10
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/10
14
reference_url http://seclists.org/fulldisclosure/2023/Oct/2
reference_id 2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/2
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241403
reference_id 2241403
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241403
16
reference_url http://seclists.org/fulldisclosure/2023/Oct/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/3
17
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/3
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/
reference_id 4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/
19
reference_url http://seclists.org/fulldisclosure/2023/Oct/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/8
20
reference_url http://seclists.org/fulldisclosure/2023/Oct/9
reference_id 9
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/9
21
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://security.gentoo.org/glsa/202401-33
22
reference_url https://support.apple.com/en-us/HT213936
reference_id HT213936
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213936
23
reference_url https://support.apple.com/en-us/HT213937
reference_id HT213937
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213937
24
reference_url https://support.apple.com/en-us/HT213938
reference_id HT213938
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213938
25
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213940
26
reference_url https://support.apple.com/en-us/HT213941
reference_id HT213941
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213941
27
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
28
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-35074
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nhy8-sfpr-eudu
12
url VCID-q1rs-zvcq-9kbd
vulnerability_id VCID-q1rs-zvcq-9kbd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37450.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37450.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37450
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17077
published_at 2026-04-02T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16804
published_at 2026-04-24T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17131
published_at 2026-04-04T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16908
published_at 2026-04-07T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16997
published_at 2026-04-08T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17055
published_at 2026-04-09T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17031
published_at 2026-04-11T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16985
published_at 2026-04-12T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16925
published_at 2026-04-13T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16862
published_at 2026-04-16T12:55:00Z
10
value 0.00054
scoring_system epss
scoring_elements 0.16864
published_at 2026-04-18T12:55:00Z
11
value 0.00054
scoring_system epss
scoring_elements 0.16902
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37450
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2223000
reference_id 2223000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2223000
5
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://security.gentoo.org/glsa/202401-04
6
reference_url https://support.apple.com/en-us/HT213826
reference_id HT213826
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213826
7
reference_url https://support.apple.com/en-us/HT213841
reference_id HT213841
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213841
8
reference_url https://support.apple.com/en-us/HT213843
reference_id HT213843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213843
9
reference_url https://support.apple.com/en-us/HT213846
reference_id HT213846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213846
10
reference_url https://support.apple.com/en-us/HT213848
reference_id HT213848
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213848
11
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
12
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
aliases CVE-2023-37450
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q1rs-zvcq-9kbd
13
url VCID-rj9q-8rw3-qbbn
vulnerability_id VCID-rj9q-8rw3-qbbn
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24264
reference_id
reference_type
scores
0
value 0.01384
scoring_system epss
scoring_elements 0.80265
published_at 2026-04-02T12:55:00Z
1
value 0.01384
scoring_system epss
scoring_elements 0.80347
published_at 2026-04-21T12:55:00Z
2
value 0.01384
scoring_system epss
scoring_elements 0.80342
published_at 2026-04-18T12:55:00Z
3
value 0.01384
scoring_system epss
scoring_elements 0.8034
published_at 2026-04-16T12:55:00Z
4
value 0.01384
scoring_system epss
scoring_elements 0.8031
published_at 2026-04-13T12:55:00Z
5
value 0.01384
scoring_system epss
scoring_elements 0.80316
published_at 2026-04-12T12:55:00Z
6
value 0.01384
scoring_system epss
scoring_elements 0.80331
published_at 2026-04-11T12:55:00Z
7
value 0.01384
scoring_system epss
scoring_elements 0.80313
published_at 2026-04-09T12:55:00Z
8
value 0.01384
scoring_system epss
scoring_elements 0.80302
published_at 2026-04-08T12:55:00Z
9
value 0.01384
scoring_system epss
scoring_elements 0.80286
published_at 2026-04-04T12:55:00Z
10
value 0.01384
scoring_system epss
scoring_elements 0.80274
published_at 2026-04-07T12:55:00Z
11
value 0.01656
scoring_system epss
scoring_elements 0.82106
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24264
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357918
reference_id 2357918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357918
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
13
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
14
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
15
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
16
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
17
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
aliases CVE-2025-24264
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9q-8rw3-qbbn
14
url VCID-sby7-u527-fqfg
vulnerability_id VCID-sby7-u527-fqfg
summary webkitgtk: memory corruption issue leading to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32435.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32435.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32435
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.46171
published_at 2026-04-02T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46178
published_at 2026-04-24T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46139
published_at 2026-04-07T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.46195
published_at 2026-04-08T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46194
published_at 2026-04-09T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46217
published_at 2026-04-11T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46189
published_at 2026-04-12T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46199
published_at 2026-04-13T12:55:00Z
8
value 0.00233
scoring_system epss
scoring_elements 0.46256
published_at 2026-04-16T12:55:00Z
9
value 0.00233
scoring_system epss
scoring_elements 0.46253
published_at 2026-04-18T12:55:00Z
10
value 0.00233
scoring_system epss
scoring_elements 0.46196
published_at 2026-04-21T12:55:00Z
11
value 0.00233
scoring_system epss
scoring_elements 0.46191
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32435
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218626
reference_id 2218626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218626
14
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/
url https://support.apple.com/en-us/HT213670
15
reference_url https://support.apple.com/en-us/HT213671
reference_id HT213671
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/
url https://support.apple.com/en-us/HT213671
16
reference_url https://support.apple.com/en-us/HT213676
reference_id HT213676
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/
url https://support.apple.com/en-us/HT213676
17
reference_url https://support.apple.com/en-us/HT213811
reference_id HT213811
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/
url https://support.apple.com/en-us/HT213811
18
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
19
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
aliases CVE-2023-32435
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sby7-u527-fqfg
15
url VCID-shfm-129h-47ha
vulnerability_id VCID-shfm-129h-47ha
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32885
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40756
published_at 2026-04-02T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40572
published_at 2026-04-24T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40765
published_at 2026-04-09T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.4075
published_at 2026-04-12T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40731
published_at 2026-04-13T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40776
published_at 2026-04-16T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40746
published_at 2026-04-18T12:55:00Z
7
value 0.00189
scoring_system epss
scoring_elements 0.40668
published_at 2026-04-21T12:55:00Z
8
value 0.00189
scoring_system epss
scoring_elements 0.40784
published_at 2026-04-11T12:55:00Z
9
value 0.00189
scoring_system epss
scoring_elements 0.40708
published_at 2026-04-07T12:55:00Z
10
value 0.00189
scoring_system epss
scoring_elements 0.40758
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236842
reference_id 2236842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236842
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213341
reference_id HT213341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/
url https://support.apple.com/en-us/HT213341
15
reference_url https://support.apple.com/en-us/HT213346
reference_id HT213346
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/
url https://support.apple.com/en-us/HT213346
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
19
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
20
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
23
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
24
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
25
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2022-32885
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shfm-129h-47ha
16
url VCID-uugz-x8q6-fbe4
vulnerability_id VCID-uugz-x8q6-fbe4
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41993.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41993.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41993
reference_id
reference_type
scores
0
value 0.24414
scoring_system epss
scoring_elements 0.96126
published_at 2026-04-24T12:55:00Z
1
value 0.24414
scoring_system epss
scoring_elements 0.96101
published_at 2026-04-08T12:55:00Z
2
value 0.24414
scoring_system epss
scoring_elements 0.96104
published_at 2026-04-09T12:55:00Z
3
value 0.24414
scoring_system epss
scoring_elements 0.96107
published_at 2026-04-12T12:55:00Z
4
value 0.24414
scoring_system epss
scoring_elements 0.96109
published_at 2026-04-13T12:55:00Z
5
value 0.24414
scoring_system epss
scoring_elements 0.96118
published_at 2026-04-16T12:55:00Z
6
value 0.24414
scoring_system epss
scoring_elements 0.96123
published_at 2026-04-18T12:55:00Z
7
value 0.24891
scoring_system epss
scoring_elements 0.9617
published_at 2026-04-21T12:55:00Z
8
value 0.24891
scoring_system epss
scoring_elements 0.96134
published_at 2026-04-04T12:55:00Z
9
value 0.24891
scoring_system epss
scoring_elements 0.96139
published_at 2026-04-07T12:55:00Z
10
value 0.24891
scoring_system epss
scoring_elements 0.96127
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41993
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240522
reference_id 2240522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240522
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/
url https://support.apple.com/en-us/HT213940
16
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
18
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/6426-1/
reference_id USN-6426-1
reference_type
scores
url https://usn.ubuntu.com/6426-1/
fixed_packages
aliases CVE-2023-41993
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uugz-x8q6-fbe4
17
url VCID-vbyq-sqqw-c3bm
vulnerability_id VCID-vbyq-sqqw-c3bm
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23252.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23252.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270288
reference_id 2270288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270288
3
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
4
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
5
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
6
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
7
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
aliases CVE-2024-23252
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbyq-sqqw-c3bm
18
url VCID-vt3f-hrb1-33cw
vulnerability_id VCID-vt3f-hrb1-33cw
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38594
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.63101
published_at 2026-04-09T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.63041
published_at 2026-04-02T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.63069
published_at 2026-04-04T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-07T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63084
published_at 2026-04-08T12:55:00Z
5
value 0.00525
scoring_system epss
scoring_elements 0.67025
published_at 2026-04-11T12:55:00Z
6
value 0.00525
scoring_system epss
scoring_elements 0.6698
published_at 2026-04-13T12:55:00Z
7
value 0.00525
scoring_system epss
scoring_elements 0.67013
published_at 2026-04-16T12:55:00Z
8
value 0.00525
scoring_system epss
scoring_elements 0.67028
published_at 2026-04-18T12:55:00Z
9
value 0.00525
scoring_system epss
scoring_elements 0.67011
published_at 2026-04-12T12:55:00Z
10
value 0.00552
scoring_system epss
scoring_elements 0.68043
published_at 2026-04-21T12:55:00Z
11
value 0.00552
scoring_system epss
scoring_elements 0.68086
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231018
reference_id 2231018
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231018
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
18
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
19
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
20
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38594
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vt3f-hrb1-33cw
19
url VCID-vwaa-vyn9-d3ey
vulnerability_id VCID-vwaa-vyn9-d3ey
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38595
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.69863
published_at 2026-04-24T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-12T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-13T12:55:00Z
3
value 0.00611
scoring_system epss
scoring_elements 0.69821
published_at 2026-04-16T12:55:00Z
4
value 0.00611
scoring_system epss
scoring_elements 0.69831
published_at 2026-04-18T12:55:00Z
5
value 0.00611
scoring_system epss
scoring_elements 0.69812
published_at 2026-04-21T12:55:00Z
6
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-11T12:55:00Z
7
value 0.00992
scoring_system epss
scoring_elements 0.76865
published_at 2026-04-04T12:55:00Z
8
value 0.00992
scoring_system epss
scoring_elements 0.76847
published_at 2026-04-07T12:55:00Z
9
value 0.00992
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-08T12:55:00Z
10
value 0.00992
scoring_system epss
scoring_elements 0.76889
published_at 2026-04-09T12:55:00Z
11
value 0.00992
scoring_system epss
scoring_elements 0.76836
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231019
reference_id 2231019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231019
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
19
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38595
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwaa-vyn9-d3ey
20
url VCID-wbn4-ea3w-k7f3
vulnerability_id VCID-wbn4-ea3w-k7f3
summary webkitgtk: Processing web content may lead to a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24158
reference_id
reference_type
scores
0
value 0.0086
scoring_system epss
scoring_elements 0.74985
published_at 2026-04-02T12:55:00Z
1
value 0.0086
scoring_system epss
scoring_elements 0.75097
published_at 2026-04-24T12:55:00Z
2
value 0.0086
scoring_system epss
scoring_elements 0.75014
published_at 2026-04-04T12:55:00Z
3
value 0.0086
scoring_system epss
scoring_elements 0.7499
published_at 2026-04-07T12:55:00Z
4
value 0.0086
scoring_system epss
scoring_elements 0.75024
published_at 2026-04-08T12:55:00Z
5
value 0.0086
scoring_system epss
scoring_elements 0.75036
published_at 2026-04-12T12:55:00Z
6
value 0.0086
scoring_system epss
scoring_elements 0.75057
published_at 2026-04-11T12:55:00Z
7
value 0.0086
scoring_system epss
scoring_elements 0.75025
published_at 2026-04-13T12:55:00Z
8
value 0.0086
scoring_system epss
scoring_elements 0.75062
published_at 2026-04-16T12:55:00Z
9
value 0.0086
scoring_system epss
scoring_elements 0.75069
published_at 2026-04-18T12:55:00Z
10
value 0.0086
scoring_system epss
scoring_elements 0.75059
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122071
reference_id 122071
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122071
7
reference_url https://support.apple.com/en-us/122072
reference_id 122072
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122072
8
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122073
9
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122074
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344623
reference_id 2344623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344623
11
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
14
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
aliases CVE-2025-24158
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbn4-ea3w-k7f3
21
url VCID-ya13-9pc8-n3ht
vulnerability_id VCID-ya13-9pc8-n3ht
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23222
reference_id
reference_type
scores
0
value 0.00559
scoring_system epss
scoring_elements 0.6832
published_at 2026-04-24T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69709
published_at 2026-04-12T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69723
published_at 2026-04-11T12:55:00Z
3
value 0.00608
scoring_system epss
scoring_elements 0.69744
published_at 2026-04-18T12:55:00Z
4
value 0.00608
scoring_system epss
scoring_elements 0.69735
published_at 2026-04-16T12:55:00Z
5
value 0.00608
scoring_system epss
scoring_elements 0.69696
published_at 2026-04-13T12:55:00Z
6
value 0.00623
scoring_system epss
scoring_elements 0.70076
published_at 2026-04-02T12:55:00Z
7
value 0.00625
scoring_system epss
scoring_elements 0.70115
published_at 2026-04-07T12:55:00Z
8
value 0.00625
scoring_system epss
scoring_elements 0.70178
published_at 2026-04-09T12:55:00Z
9
value 0.00625
scoring_system epss
scoring_elements 0.70162
published_at 2026-04-08T12:55:00Z
10
value 0.00625
scoring_system epss
scoring_elements 0.70137
published_at 2026-04-04T12:55:00Z
11
value 0.00849
scoring_system epss
scoring_elements 0.74895
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/118479
reference_id 118479
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/118479
8
reference_url https://support.apple.com/en-us/120304
reference_id 120304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120304
9
reference_url https://support.apple.com/en-us/120305
reference_id 120305
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120305
10
reference_url https://support.apple.com/en-us/120307
reference_id 120307
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120307
11
reference_url https://support.apple.com/en-us/120309
reference_id 120309
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120309
12
reference_url https://support.apple.com/en-us/120310
reference_id 120310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120310
13
reference_url https://support.apple.com/en-us/120311
reference_id 120311
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120311
14
reference_url https://support.apple.com/en-us/120339
reference_id 120339
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120339
15
reference_url https://support.apple.com/en-us/126632
reference_id 126632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/126632
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259893
reference_id 2259893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259893
17
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
18
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
19
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
22
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
23
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
24
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/6631-1/
reference_id USN-6631-1
reference_type
scores
url https://usn.ubuntu.com/6631-1/
fixed_packages
aliases CVE-2024-23222
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ya13-9pc8-n3ht
22
url VCID-ytw3-vz3r-rqdd
vulnerability_id VCID-ytw3-vz3r-rqdd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32439.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32439
reference_id
reference_type
scores
0
value 0.0116
scoring_system epss
scoring_elements 0.78545
published_at 2026-04-02T12:55:00Z
1
value 0.0116
scoring_system epss
scoring_elements 0.78642
published_at 2026-04-24T12:55:00Z
2
value 0.0116
scoring_system epss
scoring_elements 0.78575
published_at 2026-04-04T12:55:00Z
3
value 0.0116
scoring_system epss
scoring_elements 0.78557
published_at 2026-04-07T12:55:00Z
4
value 0.0116
scoring_system epss
scoring_elements 0.78584
published_at 2026-04-08T12:55:00Z
5
value 0.0116
scoring_system epss
scoring_elements 0.7859
published_at 2026-04-09T12:55:00Z
6
value 0.0116
scoring_system epss
scoring_elements 0.78614
published_at 2026-04-11T12:55:00Z
7
value 0.0116
scoring_system epss
scoring_elements 0.78596
published_at 2026-04-12T12:55:00Z
8
value 0.0116
scoring_system epss
scoring_elements 0.78587
published_at 2026-04-13T12:55:00Z
9
value 0.0116
scoring_system epss
scoring_elements 0.78616
published_at 2026-04-16T12:55:00Z
10
value 0.0116
scoring_system epss
scoring_elements 0.78615
published_at 2026-04-18T12:55:00Z
11
value 0.0116
scoring_system epss
scoring_elements 0.78611
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218640
reference_id 2218640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218640
5
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://security.gentoo.org/glsa/202401-04
6
reference_url https://support.apple.com/en-us/HT213811
reference_id HT213811
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213811
7
reference_url https://support.apple.com/en-us/HT213813
reference_id HT213813
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213813
8
reference_url https://support.apple.com/en-us/HT213814
reference_id HT213814
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213814
9
reference_url https://support.apple.com/kb/HT213814
reference_id HT213814
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/kb/HT213814
10
reference_url https://support.apple.com/en-us/HT213816
reference_id HT213816
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213816
11
reference_url https://support.apple.com/kb/HT213816
reference_id HT213816
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/kb/HT213816
12
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
13
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
aliases CVE-2023-32439
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytw3-vz3r-rqdd
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2%3Farch=3