Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/943148?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/943148?format=api", "purl": "pkg:deb/debian/wpewebkit@2.50.4-1?distro=trixie", "type": "deb", "namespace": "debian", "name": "wpewebkit", "version": "2.50.4-1", "qualifiers": { "distro": "trixie" }, "subpath": "", "is_vulnerable": false, "next_non_vulnerable_version": "2.50.5-1", "latest_non_vulnerable_version": "2.52.2-1", "affected_by_vulnerabilities": [], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65877?format=api", "vulnerability_id": "VCID-76jg-y2sa-f7cu", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43501", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22817", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22706", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22728", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22801", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22763", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43501" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423185", "reference_id": "2423185", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943148?format=api", "purl": "pkg:deb/debian/wpewebkit@2.50.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.50.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943076?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066851?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-43501" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-76jg-y2sa-f7cu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65878?format=api", "vulnerability_id": "VCID-dvx9-km9t-yqfv", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30817", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30865", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30683", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30742", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30774", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30777", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30733", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125889", "reference_id": "125889", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125889" }, { "reference_url": "https://support.apple.com/en-us/125890", "reference_id": "125890", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125890" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423187", "reference_id": "2423187", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943148?format=api", "purl": "pkg:deb/debian/wpewebkit@2.50.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.50.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943076?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066851?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-43531" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvx9-km9t-yqfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65881?format=api", "vulnerability_id": "VCID-j31g-7h17-27c8", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13378", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13443", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13239", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13321", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13373", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13342", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13304", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423191", "reference_id": "2423191", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943148?format=api", "purl": "pkg:deb/debian/wpewebkit@2.50.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.50.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943076?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066851?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-43541" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j31g-7h17-27c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66054?format=api", "vulnerability_id": "VCID-jyw2-fu8s-3fha", "summary": "Google Chrome: chromium: webkitgtk: Out of bounds memory access via crafted HTML page", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.7521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75819", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01047", "scoring_system": "epss", "scoring_elements": "0.77501", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421824", "reference_id": "2421824", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421824" }, { "reference_url": "https://issues.chromium.org/issues/466192044", "reference_id": "466192044", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/" } ], "url": "https://issues.chromium.org/issues/466192044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html", "reference_id": "stable-channel-update-for-desktop_10.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/" } ], "url": "https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943148?format=api", "purl": "pkg:deb/debian/wpewebkit@2.50.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.50.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943076?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066851?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-14174" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jyw2-fu8s-3fha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65880?format=api", "vulnerability_id": "VCID-nmvc-maj7-rfhm", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43536", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18813", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.1863", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18723", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18728", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18681", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423190", "reference_id": "2423190", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943148?format=api", "purl": "pkg:deb/debian/wpewebkit@2.50.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.50.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943076?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066851?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-43536" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nmvc-maj7-rfhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66045?format=api", "vulnerability_id": "VCID-ph63-r178-pfgg", "summary": "webkitgtk: webkitgtk: Use-after-free due to improper memory management", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31831", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31731", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31702", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.3165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35936", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35896", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125889", "reference_id": "125889", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125889" }, { "reference_url": "https://support.apple.com/en-us/125890", "reference_id": "125890", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125890" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423166", "reference_id": "2423166", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943148?format=api", "purl": "pkg:deb/debian/wpewebkit@2.50.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.50.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943076?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066851?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-43529" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ph63-r178-pfgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65879?format=api", "vulnerability_id": "VCID-z7hw-fywx-dffc", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11532", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11542", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11508", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423188", "reference_id": "2423188", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/943148?format=api", "purl": "pkg:deb/debian/wpewebkit@2.50.4-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.50.4-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/943076?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.1-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1%3Fdistro=trixie" }, { "url": "http://public2.vulnerablecode.io/api/packages/1066851?format=api", "purl": "pkg:deb/debian/wpewebkit@2.52.2-1?distro=trixie", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.2-1%3Fdistro=trixie" } ], "aliases": [ "CVE-2025-43535" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7hw-fywx-dffc" } ], "risk_score": null, "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.50.4-1%3Fdistro=trixie" }