Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wpewebkit@2.42.2-1?distro=trixie
Typedeb
Namespacedebian
Namewpewebkit
Version2.42.2-1
Qualifiers
distro trixie
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.42.3-1
Latest_non_vulnerable_version2.52.3-1
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-dafx-64dz-ubfw
vulnerability_id VCID-dafx-64dz-ubfw
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41983
reference_id
reference_type
scores
0
value 0.01108
scoring_system epss
scoring_elements 0.78065
published_at 2026-04-02T12:55:00Z
1
value 0.01108
scoring_system epss
scoring_elements 0.78095
published_at 2026-04-04T12:55:00Z
2
value 0.01108
scoring_system epss
scoring_elements 0.78077
published_at 2026-04-07T12:55:00Z
3
value 0.01108
scoring_system epss
scoring_elements 0.78103
published_at 2026-04-08T12:55:00Z
4
value 0.01108
scoring_system epss
scoring_elements 0.78107
published_at 2026-04-09T12:55:00Z
5
value 0.01108
scoring_system epss
scoring_elements 0.78133
published_at 2026-04-11T12:55:00Z
6
value 0.01108
scoring_system epss
scoring_elements 0.78115
published_at 2026-04-12T12:55:00Z
7
value 0.01108
scoring_system epss
scoring_elements 0.78111
published_at 2026-04-13T12:55:00Z
8
value 0.01108
scoring_system epss
scoring_elements 0.78146
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41983
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271453
reference_id 2271453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271453
6
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
7
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
8
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
9
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
10
reference_url https://usn.ubuntu.com/6490-1/
reference_id USN-6490-1
reference_type
scores
url https://usn.ubuntu.com/6490-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.42.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.42.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.42.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
4
url pkg:deb/debian/wpewebkit@2.52.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1%3Fdistro=trixie
aliases CVE-2023-41983
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dafx-64dz-ubfw
1
url VCID-x73g-k7yh-qydd
vulnerability_id VCID-x73g-k7yh-qydd
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42852
reference_id
reference_type
scores
0
value 0.02171
scoring_system epss
scoring_elements 0.84344
published_at 2026-04-18T12:55:00Z
1
value 0.02171
scoring_system epss
scoring_elements 0.84267
published_at 2026-04-02T12:55:00Z
2
value 0.02171
scoring_system epss
scoring_elements 0.84343
published_at 2026-04-16T12:55:00Z
3
value 0.02171
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-13T12:55:00Z
4
value 0.02171
scoring_system epss
scoring_elements 0.84325
published_at 2026-04-12T12:55:00Z
5
value 0.02171
scoring_system epss
scoring_elements 0.84332
published_at 2026-04-11T12:55:00Z
6
value 0.02171
scoring_system epss
scoring_elements 0.84314
published_at 2026-04-09T12:55:00Z
7
value 0.02171
scoring_system epss
scoring_elements 0.84309
published_at 2026-04-08T12:55:00Z
8
value 0.02171
scoring_system epss
scoring_elements 0.84287
published_at 2026-04-07T12:55:00Z
9
value 0.02171
scoring_system epss
scoring_elements 0.84286
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/11/15/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://www.openwall.com/lists/oss-security/2023/11/15/1
6
reference_url http://seclists.org/fulldisclosure/2023/Oct/19
reference_id 19
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/19
7
reference_url http://seclists.org/fulldisclosure/2023/Oct/22
reference_id 22
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/22
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271456
reference_id 2271456
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271456
9
reference_url http://seclists.org/fulldisclosure/2023/Oct/23
reference_id 23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/23
10
reference_url http://seclists.org/fulldisclosure/2023/Oct/24
reference_id 24
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/24
11
reference_url http://seclists.org/fulldisclosure/2023/Oct/25
reference_id 25
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/25
12
reference_url http://seclists.org/fulldisclosure/2023/Oct/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/27
13
reference_url https://www.debian.org/security/2023/dsa-5557
reference_id dsa-5557
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://www.debian.org/security/2023/dsa-5557
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://support.apple.com/en-us/HT213981
reference_id HT213981
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213981
16
reference_url https://support.apple.com/en-us/HT213982
reference_id HT213982
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213982
17
reference_url https://support.apple.com/en-us/HT213984
reference_id HT213984
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213984
18
reference_url https://support.apple.com/kb/HT213984
reference_id HT213984
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/kb/HT213984
19
reference_url https://support.apple.com/en-us/HT213986
reference_id HT213986
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213986
20
reference_url https://support.apple.com/en-us/HT213987
reference_id HT213987
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213987
21
reference_url https://support.apple.com/en-us/HT213988
reference_id HT213988
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213988
22
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
23
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
24
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
25
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
26
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
27
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
28
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
29
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
30
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/
reference_id RPPMOWFYZODONTA3RLZOKSGNR4DELGG2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/
reference_id S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/
33
reference_url https://usn.ubuntu.com/6490-1/
reference_id USN-6490-1
reference_type
scores
url https://usn.ubuntu.com/6490-1/
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/
reference_id ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.42.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.42.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.42.2-1%3Fdistro=trixie
1
url pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.48.3-1?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-25ng-4kwb-qfat
2
vulnerability VCID-2hr6-uu49-1qb7
3
vulnerability VCID-2pgr-9muu-s3ge
4
vulnerability VCID-3k6e-zz11-93bn
5
vulnerability VCID-4k57-k2s6-wkhx
6
vulnerability VCID-5q44-vqhn-zydx
7
vulnerability VCID-76jg-y2sa-f7cu
8
vulnerability VCID-7j7p-hnbd-hudk
9
vulnerability VCID-7ut5-fu6w-63fs
10
vulnerability VCID-88kv-qter-5fc3
11
vulnerability VCID-8cxd-4p9j-dyf1
12
vulnerability VCID-988h-sqnj-57fg
13
vulnerability VCID-ahcu-937r-57fu
14
vulnerability VCID-aqvh-emss-bufx
15
vulnerability VCID-az2z-2mnu-sfbh
16
vulnerability VCID-bjtx-twmy-jbgk
17
vulnerability VCID-dvx9-km9t-yqfv
18
vulnerability VCID-ednn-ppw1-myfk
19
vulnerability VCID-ems1-41u6-vbex
20
vulnerability VCID-epzj-t14z-43d2
21
vulnerability VCID-eu4s-vvyf-pqh3
22
vulnerability VCID-ffha-wafn-sqa9
23
vulnerability VCID-fpvs-seby-kfhv
24
vulnerability VCID-gqjq-p4re-gkf6
25
vulnerability VCID-gqm2-5nh3-7ufp
26
vulnerability VCID-gwt6-n8ue-mqcf
27
vulnerability VCID-hvj6-wsg9-1bhg
28
vulnerability VCID-j31g-7h17-27c8
29
vulnerability VCID-jbuw-yp7v-4fcz
30
vulnerability VCID-jyw2-fu8s-3fha
31
vulnerability VCID-kx6w-wbua-5ffr
32
vulnerability VCID-m59e-8bgm-77he
33
vulnerability VCID-mfg4-2ma4-3qgj
34
vulnerability VCID-mhfm-j5xm-wybd
35
vulnerability VCID-mmcp-4qnx-5ufh
36
vulnerability VCID-nmvc-maj7-rfhm
37
vulnerability VCID-nu9v-3xak-77aw
38
vulnerability VCID-nwkr-s7vs-p7fz
39
vulnerability VCID-p84d-5ze6-9fb5
40
vulnerability VCID-ph63-r178-pfgg
41
vulnerability VCID-pwqw-z8jj-abfs
42
vulnerability VCID-qytm-81jk-muhc
43
vulnerability VCID-r857-ke39-xug8
44
vulnerability VCID-stjs-xknd-zfgh
45
vulnerability VCID-t46t-rhgu-cbc1
46
vulnerability VCID-teue-y6qz-jyfw
47
vulnerability VCID-u6k6-1hmc-tfaf
48
vulnerability VCID-unu1-sbnm-27bf
49
vulnerability VCID-vk4e-qufz-5ffp
50
vulnerability VCID-w3r3-11kt-2ydu
51
vulnerability VCID-w5gq-k53s-tuc5
52
vulnerability VCID-whma-xbxr-5uay
53
vulnerability VCID-wnxh-854z-ykfk
54
vulnerability VCID-wrt4-z8ne-zffm
55
vulnerability VCID-x5sh-5xtn-r7cp
56
vulnerability VCID-xpp8-357g-c7gp
57
vulnerability VCID-xr5y-1ebg-xqcj
58
vulnerability VCID-yfww-r9rn-73dy
59
vulnerability VCID-yg6b-hsst-ckaa
60
vulnerability VCID-z7hw-fywx-dffc
61
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.48.3-1%3Fdistro=trixie
2
url pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie
3
url pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie
4
url pkg:deb/debian/wpewebkit@2.52.3-1?distro=trixie
purl pkg:deb/debian/wpewebkit@2.52.3-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1%3Fdistro=trixie
aliases CVE-2023-42852
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x73g-k7yh-qydd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.42.2-1%3Fdistro=trixie