Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/942574?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "type": "deb", "namespace": "debian", "name": "webkit2gtk", "version": "2.44.3-1~deb12u1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.44.3-1", "latest_non_vulnerable_version": "2.52.1-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74669?format=api", "vulnerability_id": "VCID-1164-uckc-qfbs", "summary": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40789", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00696", "scoring_system": "epss", "scoring_elements": "0.71921", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00754", "scoring_system": "epss", "scoring_elements": "0.73176", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73263", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73214", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73241", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.7325", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73269", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00756", "scoring_system": "epss", "scoring_elements": "0.73289", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40789" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120908", "reference_id": "120908", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/120908" }, { "reference_url": "https://support.apple.com/en-us/120909", "reference_id": "120909", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/120909" }, { "reference_url": "https://support.apple.com/en-us/120911", "reference_id": "120911", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/120911" }, { "reference_url": "https://support.apple.com/en-us/120913", "reference_id": "120913", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/120913" }, { "reference_url": "https://support.apple.com/en-us/120914", "reference_id": "120914", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/120914" }, { "reference_url": "https://support.apple.com/en-us/120915", "reference_id": "120915", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/120915" }, { "reference_url": "https://support.apple.com/en-us/120916", "reference_id": "120916", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/120916" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/15" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/16" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/17", "reference_id": "17", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/17" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18", "reference_id": "18", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/21", "reference_id": "21", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/21" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/22", "reference_id": "22", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/22" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/23", "reference_id": "23", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067", "reference_id": "2302067", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "reference_url": "https://support.apple.com/en-us/HT214116", "reference_id": "HT214116", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/HT214116" }, { "reference_url": "https://support.apple.com/en-us/HT214117", "reference_id": "HT214117", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/HT214117" }, { "reference_url": "https://support.apple.com/en-us/HT214119", "reference_id": "HT214119", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/HT214119" }, { "reference_url": "https://support.apple.com/en-us/HT214121", "reference_id": "HT214121", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/HT214121" }, { "reference_url": "https://support.apple.com/kb/HT214121", "reference_id": "HT214121", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/kb/HT214121" }, { "reference_url": "https://support.apple.com/en-us/HT214122", "reference_id": "HT214122", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/HT214122" }, { "reference_url": "https://support.apple.com/en-us/HT214123", "reference_id": "HT214123", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/HT214123" }, { "reference_url": "https://support.apple.com/en-us/HT214124", "reference_id": "HT214124", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/" } ], "url": "https://support.apple.com/en-us/HT214124" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8492", "reference_id": "RHSA-2024:8492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9646", "reference_id": "RHSA-2024:9646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/6996-1/", "reference_id": "USN-6996-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6996-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942578?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942575?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-40789" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1164-uckc-qfbs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74668?format=api", "vulnerability_id": "VCID-4d1k-nwkw-j3g4", "summary": "webkitgtk: webkit2gtk: Private Browsing tabs may be accessed without authentication", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40794.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40794.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40794", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00402", "scoring_system": "epss", "scoring_elements": "0.60786", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66562", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66597", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.6663", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66642", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.66623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.6661", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00515", "scoring_system": "epss", "scoring_elements": "0.6659", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40794" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40794", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40794" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120909", "reference_id": "120909", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/" } ], "url": "https://support.apple.com/en-us/120909" }, { "reference_url": "https://support.apple.com/en-us/120911", "reference_id": "120911", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/" } ], "url": "https://support.apple.com/en-us/120911" }, { "reference_url": "https://support.apple.com/en-us/120913", "reference_id": "120913", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/" } ], "url": "https://support.apple.com/en-us/120913" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/15" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/16" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18", "reference_id": "18", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/18" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302066", "reference_id": "2302066", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302066" }, { "reference_url": "https://support.apple.com/en-us/HT214117", "reference_id": "HT214117", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/" } ], "url": "https://support.apple.com/en-us/HT214117" }, { "reference_url": "https://support.apple.com/en-us/HT214119", "reference_id": "HT214119", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/" } ], "url": "https://support.apple.com/en-us/HT214119" }, { "reference_url": "https://support.apple.com/en-us/HT214121", "reference_id": "HT214121", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/" } ], "url": "https://support.apple.com/en-us/HT214121" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942578?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942575?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-40794" ], "risk_score": 2.4, "exploitability": "0.5", "weighted_severity": "4.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4d1k-nwkw-j3g4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73823?format=api", "vulnerability_id": "VCID-gjvy-329h-dkgp", "summary": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27838.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27838.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27838", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0089", "scoring_system": "epss", "scoring_elements": "0.75521", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0089", "scoring_system": "epss", "scoring_elements": "0.755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0089", "scoring_system": "epss", "scoring_elements": "0.7548", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0089", "scoring_system": "epss", "scoring_elements": "0.75522", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0089", "scoring_system": "epss", "scoring_elements": "0.75532", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0089", "scoring_system": "epss", "scoring_elements": "0.75551", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0089", "scoring_system": "epss", "scoring_elements": "0.7553", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01346", "scoring_system": "epss", "scoring_elements": "0.80031", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27838" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120896", "reference_id": "120896", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/120896" }, { "reference_url": "https://support.apple.com/en-us/120898", "reference_id": "120898", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/120898" }, { "reference_url": "https://support.apple.com/en-us/120901", "reference_id": "120901", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/120901" }, { "reference_url": "https://support.apple.com/en-us/120902", "reference_id": "120902", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/120902" }, { "reference_url": "https://support.apple.com/en-us/120903", "reference_id": "120903", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/120903" }, { "reference_url": "https://support.apple.com/en-us/120905", "reference_id": "120905", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/120905" }, { "reference_url": "https://support.apple.com/en-us/120906", "reference_id": "120906", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/120906" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702", "reference_id": "2314702", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jun/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jun/5" }, { "reference_url": "https://support.apple.com/en-us/HT214100", "reference_id": "HT214100", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/HT214100" }, { "reference_url": "https://support.apple.com/en-us/HT214101", "reference_id": "HT214101", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/HT214101" }, { "reference_url": "https://support.apple.com/en-us/HT214102", "reference_id": "HT214102", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/HT214102" }, { "reference_url": "https://support.apple.com/en-us/HT214103", "reference_id": "HT214103", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/HT214103" }, { "reference_url": "https://support.apple.com/en-us/HT214104", "reference_id": "HT214104", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/HT214104" }, { "reference_url": "https://support.apple.com/en-us/HT214106", "reference_id": "HT214106", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/HT214106" }, { "reference_url": "https://support.apple.com/en-us/HT214108", "reference_id": "HT214108", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/" } ], "url": "https://support.apple.com/en-us/HT214108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942575?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-27838" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gjvy-329h-dkgp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74539?format=api", "vulnerability_id": "VCID-kp4m-h6ua-h7dm", "summary": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40776", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00348", "scoring_system": "epss", "scoring_elements": "0.57349", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59363", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59344", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5933", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59316", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.5928", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00378", "scoring_system": "epss", "scoring_elements": "0.59346", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00441", "scoring_system": "epss", "scoring_elements": "0.63204", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40776" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120908", "reference_id": "120908", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/120908" }, { "reference_url": "https://support.apple.com/en-us/120909", "reference_id": "120909", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/120909" }, { "reference_url": "https://support.apple.com/en-us/120911", "reference_id": "120911", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/120911" }, { "reference_url": "https://support.apple.com/en-us/120913", "reference_id": "120913", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/120913" }, { "reference_url": "https://support.apple.com/en-us/120914", "reference_id": "120914", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/120914" }, { "reference_url": "https://support.apple.com/en-us/120915", "reference_id": "120915", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/120915" }, { "reference_url": "https://support.apple.com/en-us/120916", "reference_id": "120916", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/120916" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/15" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/16" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/17", "reference_id": "17", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/17" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18", "reference_id": "18", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/21", "reference_id": "21", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/21" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/22", "reference_id": "22", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/22" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/23", "reference_id": "23", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841", "reference_id": "2301841", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "reference_url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/", "reference_id": "apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/" }, { "reference_url": "https://support.apple.com/en-us/HT214116", "reference_id": "HT214116", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/HT214116" }, { "reference_url": "https://support.apple.com/en-us/HT214117", "reference_id": "HT214117", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/HT214117" }, { "reference_url": "https://support.apple.com/en-us/HT214119", "reference_id": "HT214119", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/HT214119" }, { "reference_url": "https://support.apple.com/en-us/HT214121", "reference_id": "HT214121", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/HT214121" }, { "reference_url": "https://support.apple.com/en-us/HT214122", "reference_id": "HT214122", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/HT214122" }, { "reference_url": "https://support.apple.com/en-us/HT214123", "reference_id": "HT214123", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/HT214123" }, { "reference_url": "https://support.apple.com/en-us/HT214124", "reference_id": "HT214124", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/" } ], "url": "https://support.apple.com/en-us/HT214124" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8492", "reference_id": "RHSA-2024:8492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/6996-1/", "reference_id": "USN-6996-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6996-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942578?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942575?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-40776" ], "risk_score": 2.6, "exploitability": "0.5", "weighted_severity": "5.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kp4m-h6ua-h7dm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/73825?format=api", "vulnerability_id": "VCID-pg5b-3vcj-7bav", "summary": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27851", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76783", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76758", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.7674", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76771", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.76782", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.7681", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00982", "scoring_system": "epss", "scoring_elements": "0.7679", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01303", "scoring_system": "epss", "scoring_elements": "0.79704", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-27851" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120896", "reference_id": "120896", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/120896" }, { "reference_url": "https://support.apple.com/en-us/120901", "reference_id": "120901", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/120901" }, { "reference_url": "https://support.apple.com/en-us/120902", "reference_id": "120902", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/120902" }, { "reference_url": "https://support.apple.com/en-us/120903", "reference_id": "120903", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/120903" }, { "reference_url": "https://support.apple.com/en-us/120905", "reference_id": "120905", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/120905" }, { "reference_url": "https://support.apple.com/en-us/120906", "reference_id": "120906", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/120906" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704", "reference_id": "2314704", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jun/5", "reference_id": "5", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jun/5" }, { "reference_url": "https://support.apple.com/en-us/HT214101", "reference_id": "HT214101", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/HT214101" }, { "reference_url": "https://support.apple.com/en-us/HT214102", "reference_id": "HT214102", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/HT214102" }, { "reference_url": "https://support.apple.com/en-us/HT214103", "reference_id": "HT214103", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/HT214103" }, { "reference_url": "https://support.apple.com/en-us/HT214104", "reference_id": "HT214104", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/HT214104" }, { "reference_url": "https://support.apple.com/en-us/HT214106", "reference_id": "HT214106", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/HT214106" }, { "reference_url": "https://support.apple.com/en-us/HT214108", "reference_id": "HT214108", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/" } ], "url": "https://support.apple.com/en-us/HT214108" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8492", "reference_id": "RHSA-2024:8492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9646", "reference_id": "RHSA-2024:9646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942575?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-27851" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5b-3vcj-7bav" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74670?format=api", "vulnerability_id": "VCID-q3jv-e392-5fef", "summary": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40780", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25195", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26649", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26644", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26594", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26526", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26604", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.26699", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40780" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120908", "reference_id": "120908", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/120908" }, { "reference_url": "https://support.apple.com/en-us/120909", "reference_id": "120909", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/120909" }, { "reference_url": "https://support.apple.com/en-us/120911", "reference_id": "120911", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/120911" }, { "reference_url": "https://support.apple.com/en-us/120913", "reference_id": "120913", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/120913" }, { "reference_url": "https://support.apple.com/en-us/120914", "reference_id": "120914", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/120914" }, { "reference_url": "https://support.apple.com/en-us/120915", "reference_id": "120915", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/120915" }, { "reference_url": "https://support.apple.com/en-us/120916", "reference_id": "120916", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/120916" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/15" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/16" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/17", "reference_id": "17", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/17" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18", "reference_id": "18", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/21", "reference_id": "21", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/21" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/22", "reference_id": "22", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/22" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/23", "reference_id": "23", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069", "reference_id": "2302069", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "reference_url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/", "reference_id": "apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/" }, { "reference_url": "https://support.apple.com/en-us/HT214116", "reference_id": "HT214116", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/HT214116" }, { "reference_url": "https://support.apple.com/en-us/HT214117", "reference_id": "HT214117", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/HT214117" }, { "reference_url": "https://support.apple.com/en-us/HT214119", "reference_id": "HT214119", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/HT214119" }, { "reference_url": "https://support.apple.com/en-us/HT214121", "reference_id": "HT214121", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/HT214121" }, { "reference_url": "https://support.apple.com/en-us/HT214122", "reference_id": "HT214122", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/HT214122" }, { "reference_url": "https://support.apple.com/en-us/HT214123", "reference_id": "HT214123", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/HT214123" }, { "reference_url": "https://support.apple.com/en-us/HT214124", "reference_id": "HT214124", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/" } ], "url": "https://support.apple.com/en-us/HT214124" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8492", "reference_id": "RHSA-2024:8492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9646", "reference_id": "RHSA-2024:9646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/6996-1/", "reference_id": "USN-6996-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6996-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942578?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942575?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-40780" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-q3jv-e392-5fef" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74672?format=api", "vulnerability_id": "VCID-qvy2-8161-eycu", "summary": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40782", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00389", "scoring_system": "epss", "scoring_elements": "0.6002", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62134", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62144", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62125", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62107", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62057", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00423", "scoring_system": "epss", "scoring_elements": "0.62088", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00445", "scoring_system": "epss", "scoring_elements": "0.63402", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40782" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120908", "reference_id": "120908", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/120908" }, { "reference_url": "https://support.apple.com/en-us/120909", "reference_id": "120909", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/120909" }, { "reference_url": "https://support.apple.com/en-us/120911", "reference_id": "120911", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/120911" }, { "reference_url": "https://support.apple.com/en-us/120913", "reference_id": "120913", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/120913" }, { "reference_url": "https://support.apple.com/en-us/120914", "reference_id": "120914", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/120914" }, { "reference_url": "https://support.apple.com/en-us/120915", "reference_id": "120915", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/120915" }, { "reference_url": "https://support.apple.com/en-us/120916", "reference_id": "120916", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/120916" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/15" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/16" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/17", "reference_id": "17", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/17" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18", "reference_id": "18", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/21", "reference_id": "21", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/21" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/22", "reference_id": "22", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/22" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/23", "reference_id": "23", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071", "reference_id": "2302071", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "reference_url": "https://support.apple.com/en-us/HT214116", "reference_id": "HT214116", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/HT214116" }, { "reference_url": "https://support.apple.com/en-us/HT214117", "reference_id": "HT214117", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/HT214117" }, { "reference_url": "https://support.apple.com/en-us/HT214119", "reference_id": "HT214119", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/HT214119" }, { "reference_url": "https://support.apple.com/en-us/HT214121", "reference_id": "HT214121", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/HT214121" }, { "reference_url": "https://support.apple.com/en-us/HT214122", "reference_id": "HT214122", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/HT214122" }, { "reference_url": "https://support.apple.com/en-us/HT214123", "reference_id": "HT214123", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/HT214123" }, { "reference_url": "https://support.apple.com/en-us/HT214124", "reference_id": "HT214124", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/" } ], "url": "https://support.apple.com/en-us/HT214124" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8492", "reference_id": "RHSA-2024:8492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9646", "reference_id": "RHSA-2024:9646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/6996-1/", "reference_id": "USN-6996-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6996-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942578?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942575?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-40782" ], "risk_score": 3.9, "exploitability": "0.5", "weighted_severity": "7.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qvy2-8161-eycu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/47471?format=api", "vulnerability_id": "VCID-u1sp-38g8-xfan", "summary": "Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.0", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0238", "scoring_system": "epss", "scoring_elements": "0.84992", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85554", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85566", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85568", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85503", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85519", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85524", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02579", "scoring_system": "epss", "scoring_elements": "0.85544", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-4558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/15" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/16" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18", "reference_id": "18", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/18" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689", "reference_id": "2279689", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "reference_url": "https://issues.chromium.org/issues/337766133", "reference_id": "337766133", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/" } ], "url": "https://issues.chromium.org/issues/337766133" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/", "reference_id": "6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/", "reference_id": "BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/", "reference_id": "FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/" }, { "reference_url": "https://security.gentoo.org/glsa/202412-05", "reference_id": "GLSA-202412-05", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202412-05" }, { "reference_url": "https://security.gentoo.org/glsa/202501-09", "reference_id": "GLSA-202501-09", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202501-09" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/", "reference_id": "IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/" }, { "reference_url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/", "reference_id": "LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/" } ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8492", "reference_id": "RHSA-2024:8492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9144", "reference_id": "RHSA-2024:9144", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9144" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9646", "reference_id": "RHSA-2024:9646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html", "reference_id": "stable-channel-update-for-desktop_7.html", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/" } ], "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html" }, { "reference_url": "https://usn.ubuntu.com/6996-1/", "reference_id": "USN-6996-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6996-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942578?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942575?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-4558" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u1sp-38g8-xfan" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74465?format=api", "vulnerability_id": "VCID-v937-hkz6-v3hc", "summary": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to a cross site scripting attack", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40785.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40785.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40785", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00635", "scoring_system": "epss", "scoring_elements": "0.70359", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70494", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70509", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70485", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70424", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.70446", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7047", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00637", "scoring_system": "epss", "scoring_elements": "0.7048", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40785" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40785", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40785" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120908", "reference_id": "120908", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/120908" }, { "reference_url": "https://support.apple.com/en-us/120909", "reference_id": "120909", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/120909" }, { "reference_url": "https://support.apple.com/en-us/120911", "reference_id": "120911", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/120911" }, { "reference_url": "https://support.apple.com/en-us/120913", "reference_id": "120913", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/120913" }, { "reference_url": "https://support.apple.com/en-us/120914", "reference_id": "120914", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/120914" }, { "reference_url": "https://support.apple.com/en-us/120915", "reference_id": "120915", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/120915" }, { "reference_url": "https://support.apple.com/en-us/120916", "reference_id": "120916", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/120916" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/15" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/16" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/17", "reference_id": "17", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/17" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18", "reference_id": "18", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/21", "reference_id": "21", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/21" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/22", "reference_id": "22", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/22" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/23", "reference_id": "23", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302068", "reference_id": "2302068", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302068" }, { "reference_url": "https://support.apple.com/en-us/HT214116", "reference_id": "HT214116", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/HT214116" }, { "reference_url": "https://support.apple.com/en-us/HT214117", "reference_id": "HT214117", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/HT214117" }, { "reference_url": "https://support.apple.com/en-us/HT214119", "reference_id": "HT214119", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/HT214119" }, { "reference_url": "https://support.apple.com/en-us/HT214121", "reference_id": "HT214121", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/HT214121" }, { "reference_url": "https://support.apple.com/en-us/HT214122", "reference_id": "HT214122", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/HT214122" }, { "reference_url": "https://support.apple.com/en-us/HT214123", "reference_id": "HT214123", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/HT214123" }, { "reference_url": "https://support.apple.com/en-us/HT214124", "reference_id": "HT214124", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/" } ], "url": "https://support.apple.com/en-us/HT214124" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942578?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942575?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-40785" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-v937-hkz6-v3hc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/74671?format=api", "vulnerability_id": "VCID-y77v-hwy6-hfhy", "summary": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40779", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00028", "scoring_system": "epss", "scoring_elements": "0.07846", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08614", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08638", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0864", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08616", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08543", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08625", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08573", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40779" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120908", "reference_id": "120908", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/120908" }, { "reference_url": "https://support.apple.com/en-us/120909", "reference_id": "120909", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/120909" }, { "reference_url": "https://support.apple.com/en-us/120911", "reference_id": "120911", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/120911" }, { "reference_url": "https://support.apple.com/en-us/120913", "reference_id": "120913", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/120913" }, { "reference_url": "https://support.apple.com/en-us/120914", "reference_id": "120914", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/120914" }, { "reference_url": "https://support.apple.com/en-us/120915", "reference_id": "120915", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/120915" }, { "reference_url": "https://support.apple.com/en-us/120916", "reference_id": "120916", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/120916" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/15", "reference_id": "15", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/15" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/16", "reference_id": "16", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/16" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/17", "reference_id": "17", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/17" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/18", "reference_id": "18", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/18" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/21", "reference_id": "21", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/21" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/22", "reference_id": "22", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/22" }, { "reference_url": "http://seclists.org/fulldisclosure/2024/Jul/23", "reference_id": "23", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "http://seclists.org/fulldisclosure/2024/Jul/23" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070", "reference_id": "2302070", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "reference_url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/", "reference_id": "apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/" }, { "reference_url": "https://support.apple.com/en-us/HT214116", "reference_id": "HT214116", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/HT214116" }, { "reference_url": "https://support.apple.com/en-us/HT214117", "reference_id": "HT214117", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/HT214117" }, { "reference_url": "https://support.apple.com/en-us/HT214119", "reference_id": "HT214119", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/HT214119" }, { "reference_url": "https://support.apple.com/en-us/HT214121", "reference_id": "HT214121", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/HT214121" }, { "reference_url": "https://support.apple.com/en-us/HT214122", "reference_id": "HT214122", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/HT214122" }, { "reference_url": "https://support.apple.com/en-us/HT214123", "reference_id": "HT214123", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/HT214123" }, { "reference_url": "https://support.apple.com/en-us/HT214124", "reference_id": "HT214124", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/" } ], "url": "https://support.apple.com/en-us/HT214124" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8492", "reference_id": "RHSA-2024:8492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9646", "reference_id": "RHSA-2024:9646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/6996-1/", "reference_id": "USN-6996-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/6996-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942578?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942574?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942575?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.3-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-40779" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-y77v-hwy6-hfhy" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.3-1~deb12u1%3Fdistro=trixie" }