Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/942590?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/942590?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "webkit2gtk", "version": "2.46.5-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.46.6-1~deb11u1", "latest_non_vulnerable_version": "2.52.2-2", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72615?format=api", "vulnerability_id": "VCID-2vtf-gudd-9fah", "summary": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71986", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71966", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71982", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72001", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121837", "reference_id": "121837", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121837" }, { "reference_url": "https://support.apple.com/en-us/121838", "reference_id": "121838", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121838" }, { "reference_url": "https://support.apple.com/en-us/121839", "reference_id": "121839", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121839" }, { "reference_url": "https://support.apple.com/en-us/121843", "reference_id": "121843", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121843" }, { "reference_url": "https://support.apple.com/en-us/121844", "reference_id": "121844", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121844" }, { "reference_url": "https://support.apple.com/en-us/121845", "reference_id": "121845", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121845" }, { "reference_url": "https://support.apple.com/en-us/121846", "reference_id": "121846", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121846" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841", "reference_id": "2333841", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0145", "reference_id": "RHSA-2025:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0146", "reference_id": "RHSA-2025:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0226", "reference_id": "RHSA-2025:0226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0276", "reference_id": "RHSA-2025:0276", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0276" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0277", "reference_id": "RHSA-2025:0277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0278", "reference_id": "RHSA-2025:0278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0279", "reference_id": "RHSA-2025:0279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0282", "reference_id": "RHSA-2025:0282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0283", "reference_id": "RHSA-2025:0283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7201-1/", "reference_id": "USN-7201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942589?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942588?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942590?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-54479" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2vtf-gudd-9fah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72614?format=api", "vulnerability_id": "VCID-9j6k-np3x-23f7", "summary": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54508", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80301", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80278", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80293", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80304", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80323", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80308", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80656", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121837", "reference_id": "121837", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121837" }, { "reference_url": "https://support.apple.com/en-us/121839", "reference_id": "121839", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121839" }, { "reference_url": "https://support.apple.com/en-us/121843", "reference_id": "121843", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121843" }, { "reference_url": "https://support.apple.com/en-us/121844", "reference_id": "121844", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121844" }, { "reference_url": "https://support.apple.com/en-us/121845", "reference_id": "121845", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121845" }, { "reference_url": "https://support.apple.com/en-us/121846", "reference_id": "121846", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121846" }, { "reference_url": "https://support.apple.com/en-us/122372", "reference_id": "122372", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/122372" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845", "reference_id": "2333845", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0145", "reference_id": "RHSA-2025:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0146", "reference_id": "RHSA-2025:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0226", "reference_id": "RHSA-2025:0226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0276", "reference_id": "RHSA-2025:0276", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0276" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0277", "reference_id": "RHSA-2025:0277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0278", "reference_id": "RHSA-2025:0278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0279", "reference_id": "RHSA-2025:0279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0282", "reference_id": "RHSA-2025:0282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0283", "reference_id": "RHSA-2025:0283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7201-1/", "reference_id": "USN-7201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942589?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942588?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942590?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-54508" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9j6k-np3x-23f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72611?format=api", "vulnerability_id": "VCID-b3dw-sj5b-5bhr", "summary": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54502", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05739", "scoring_system": "epss", "scoring_elements": "0.9041", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.9167", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.91637", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.91645", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.91658", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.91664", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.91667", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54502" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121837", "reference_id": "121837", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121837" }, { "reference_url": "https://support.apple.com/en-us/121839", "reference_id": "121839", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121839" }, { "reference_url": "https://support.apple.com/en-us/121843", "reference_id": "121843", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121843" }, { "reference_url": "https://support.apple.com/en-us/121844", "reference_id": "121844", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121844" }, { "reference_url": "https://support.apple.com/en-us/121845", "reference_id": "121845", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121845" }, { "reference_url": "https://support.apple.com/en-us/121846", "reference_id": "121846", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121846" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843", "reference_id": "2333843", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0145", "reference_id": "RHSA-2025:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0146", "reference_id": "RHSA-2025:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0226", "reference_id": "RHSA-2025:0226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0276", "reference_id": "RHSA-2025:0276", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0276" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0277", "reference_id": "RHSA-2025:0277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0278", "reference_id": "RHSA-2025:0278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0279", "reference_id": "RHSA-2025:0279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0282", "reference_id": "RHSA-2025:0282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0283", "reference_id": "RHSA-2025:0283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7201-1/", "reference_id": "USN-7201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942589?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942588?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942590?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-54502" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b3dw-sj5b-5bhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71949?format=api", "vulnerability_id": "VCID-b8ws-1k92-7bhq", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33157", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.3462", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.3473", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34651", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34679", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34683", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34644", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121837", "reference_id": "121837", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121837" }, { "reference_url": "https://support.apple.com/en-us/121839", "reference_id": "121839", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121839" }, { "reference_url": "https://support.apple.com/en-us/121843", "reference_id": "121843", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121843" }, { "reference_url": "https://support.apple.com/en-us/121844", "reference_id": "121844", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121844" }, { "reference_url": "https://support.apple.com/en-us/121845", "reference_id": "121845", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121845" }, { "reference_url": "https://support.apple.com/en-us/121846", "reference_id": "121846", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121846" }, { "reference_url": "https://support.apple.com/en-us/122372", "reference_id": "122372", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/122372" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619", "reference_id": "2344619", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1957", "reference_id": "RHSA-2025:1957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1958", "reference_id": "RHSA-2025:1958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1959", "reference_id": "RHSA-2025:1959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1960", "reference_id": "RHSA-2025:1960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2034", "reference_id": "RHSA-2025:2034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2035", "reference_id": "RHSA-2025:2035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2121", "reference_id": "RHSA-2025:2121", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2121" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2125", "reference_id": "RHSA-2025:2125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2126", "reference_id": "RHSA-2025:2126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2126" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942589?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942588?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942590?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-54543" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ws-1k92-7bhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72613?format=api", "vulnerability_id": "VCID-kuyh-x3z4-q7gf", "summary": "webkit: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54505", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69106", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69058", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69079", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.6906", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.6911", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69129", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69152", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69136", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121837", "reference_id": "121837", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121837" }, { "reference_url": "https://support.apple.com/en-us/121838", "reference_id": "121838", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121838" }, { "reference_url": "https://support.apple.com/en-us/121839", "reference_id": "121839", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121839" }, { "reference_url": "https://support.apple.com/en-us/121843", "reference_id": "121843", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121843" }, { "reference_url": "https://support.apple.com/en-us/121844", "reference_id": "121844", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121844" }, { "reference_url": "https://support.apple.com/en-us/121845", "reference_id": "121845", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121845" }, { "reference_url": "https://support.apple.com/en-us/121846", "reference_id": "121846", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121846" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844", "reference_id": "2333844", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0145", "reference_id": "RHSA-2025:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0146", "reference_id": "RHSA-2025:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0226", "reference_id": "RHSA-2025:0226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0276", "reference_id": "RHSA-2025:0276", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0276" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0277", "reference_id": "RHSA-2025:0277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0278", "reference_id": "RHSA-2025:0278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0279", "reference_id": "RHSA-2025:0279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0282", "reference_id": "RHSA-2025:0282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0283", "reference_id": "RHSA-2025:0283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7201-1/", "reference_id": "USN-7201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/942452?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942589?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1~deb11u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1~deb11u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942588?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1~deb12u1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942590?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.46.5-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942450?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942457?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb13u1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942454?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1?distro=trixie", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/942456?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066850?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.2-2?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.2-2%3Fdistro=trixie" } ], "aliases": [ "CVE-2024-54505" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kuyh-x3z4-q7gf" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.5-1%3Fdistro=trixie" }