Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/995085?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "type": "deb", "namespace": "debian", "name": "webkit2gtk", "version": "2.50.4-1~deb12u1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "2.50.6-1~deb12u1", "latest_non_vulnerable_version": "2.52.1-1", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64216?format=api", "vulnerability_id": "VCID-25ng-4kwb-qfat", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20636", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12694", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12561", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12738", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12549", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12628", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.1268", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12648", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00041", "scoring_system": "epss", "scoring_elements": "0.12606", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20636" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448791", "reference_id": "2448791", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448791" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" } ], "aliases": [ "CVE-2026-20636" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-25ng-4kwb-qfat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64217?format=api", "vulnerability_id": "VCID-4k57-k2s6-wkhx", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20644", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.1368", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13559", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13741", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13542", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13623", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13674", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13644", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13607", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20644" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126347", "reference_id": "126347", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/" } ], "url": "https://support.apple.com/en-us/126347" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448792", "reference_id": "2448792", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448792" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" } ], "aliases": [ "CVE-2026-20644" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-4k57-k2s6-wkhx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64206?format=api", "vulnerability_id": "VCID-7ut5-fu6w-63fs", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0012", "scoring_system": "epss", "scoring_elements": "0.3113", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31173", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31353", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31172", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31225", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31256", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.3126", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00121", "scoring_system": "epss", "scoring_elements": "0.31216", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448781", "reference_id": "2448781", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448781" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" } ], "aliases": [ "CVE-2025-43213" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7ut5-fu6w-63fs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63947?format=api", "vulnerability_id": "VCID-88kv-qter-5fc3", "summary": "webkitgtk: A malicious website may be able to access script message handlers intended for other origins", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "4.7", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28861", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10489", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10517", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10377", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10514", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10511", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28861" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126793", "reference_id": "126793", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/" } ], "url": "https://support.apple.com/en-us/126793" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453007", "reference_id": "2453007", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453007" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/995089?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1" } ], "aliases": [ "CVE-2026-28861" ], "risk_score": 2.1, "exploitability": "0.5", "weighted_severity": "4.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-88kv-qter-5fc3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63942?format=api", "vulnerability_id": "VCID-8cxd-4p9j-dyf1", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20664", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11507", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11433", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11561", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11348", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11432", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11489", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11495", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11462", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20664" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453001", "reference_id": "2453001", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453001" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/995089?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1" } ], "aliases": [ "CVE-2026-20664" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-8cxd-4p9j-dyf1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64212?format=api", "vulnerability_id": "VCID-988h-sqnj-57fg", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43511", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19184", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19178", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19125", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.1933", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00061", "scoring_system": "epss", "scoring_elements": "0.19045", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24919", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43511" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125890", "reference_id": "125890", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125890" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448787", "reference_id": "2448787", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448787" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" } ], "aliases": [ "CVE-2025-43511" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-988h-sqnj-57fg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63948?format=api", "vulnerability_id": "VCID-eu4s-vvyf-pqh3", "summary": "webkitgtk: Visiting a maliciously crafted website may lead to a cross-site scripting attack", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28871", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10075", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10149", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10135", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10032", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10108", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10169", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.10209", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28871" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126793", "reference_id": "126793", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/" } ], "url": "https://support.apple.com/en-us/126793" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453008", "reference_id": "2453008", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453008" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/995089?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1" } ], "aliases": [ "CVE-2026-28871" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-eu4s-vvyf-pqh3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63946?format=api", "vulnerability_id": "VCID-ffha-wafn-sqa9", "summary": "webkitgtk: A malicious website may be able to process restricted web content outside the sandbox", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28859", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.12006", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11933", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.1205", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11853", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11936", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11988", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11996", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00039", "scoring_system": "epss", "scoring_elements": "0.11959", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28859" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126797", "reference_id": "126797", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126797" }, { "reference_url": "https://support.apple.com/en-us/126798", "reference_id": "126798", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126798" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453006", "reference_id": "2453006", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453006" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/995089?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1" } ], "aliases": [ "CVE-2026-28859" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ffha-wafn-sqa9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63944?format=api", "vulnerability_id": "VCID-fpvs-seby-kfhv", "summary": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20691", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10448", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10489", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10517", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10377", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.1045", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10514", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10544", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10511", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20691" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126798", "reference_id": "126798", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/" } ], "url": "https://support.apple.com/en-us/126798" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453003", "reference_id": "2453003", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453003" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/995089?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1" } ], "aliases": [ "CVE-2026-20691" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fpvs-seby-kfhv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63943?format=api", "vulnerability_id": "VCID-gqm2-5nh3-7ufp", "summary": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20665", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3659", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36479", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36623", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36459", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36511", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.3653", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36537", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00157", "scoring_system": "epss", "scoring_elements": "0.36502", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20665" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126793", "reference_id": "126793", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126793" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126797", "reference_id": "126797", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126797" }, { "reference_url": "https://support.apple.com/en-us/126798", "reference_id": "126798", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126798" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453002", "reference_id": "2453002", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453002" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/995089?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1" } ], "aliases": [ "CVE-2026-20665" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqm2-5nh3-7ufp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64215?format=api", "vulnerability_id": "VCID-mmcp-4qnx-5ufh", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20635", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15424", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15291", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15493", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15297", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15385", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15435", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15396", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15357", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20635" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126347", "reference_id": "126347", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126347" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126351", "reference_id": "126351", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126351" }, { "reference_url": "https://support.apple.com/en-us/126352", "reference_id": "126352", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126352" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448790", "reference_id": "2448790", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448790" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" } ], "aliases": [ "CVE-2026-20635" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mmcp-4qnx-5ufh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63941?format=api", "vulnerability_id": "VCID-nwkr-s7vs-p7fz", "summary": "webkitgtk: Processing maliciously crafted web content may bypass Same Origin Policy", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20643", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09744", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09771", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09793", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09689", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.0976", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.0981", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.0982", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00034", "scoring_system": "epss", "scoring_elements": "0.09788", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20643" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126604", "reference_id": "126604", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126604" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126793", "reference_id": "126793", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126793" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453000", "reference_id": "2453000", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453000" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/995089?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1" } ], "aliases": [ "CVE-2026-20643" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nwkr-s7vs-p7fz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64219?format=api", "vulnerability_id": "VCID-t46t-rhgu-cbc1", "summary": "webkitgtk: A website may be able to track users through Safari web extensions", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20676", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10694", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10683", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10747", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10606", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10679", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10735", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10749", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10718", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20676" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448794", "reference_id": "2448794", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448794" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" } ], "aliases": [ "CVE-2026-20676" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-t46t-rhgu-cbc1" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64213?format=api", "vulnerability_id": "VCID-teue-y6qz-jyfw", "summary": "webkitgtk: Processing maliciously crafted web content may disclose internal states of the app", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-46299", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0601", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06086", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06046", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0603", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.0607", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06109", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.061", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00023", "scoring_system": "epss", "scoring_elements": "0.06094", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-46299" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125889", "reference_id": "125889", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125889" }, { "reference_url": "https://support.apple.com/en-us/125890", "reference_id": "125890", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125890" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448788", "reference_id": "2448788", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448788" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/995089?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1" } ], "aliases": [ "CVE-2025-46299" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-teue-y6qz-jyfw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64218?format=api", "vulnerability_id": "VCID-w5gq-k53s-tuc5", "summary": "webkitgtk: A remote attacker may be able to cause a denial-of-service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20652", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38025", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37947", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38051", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.3793", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37981", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37992", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38009", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37972", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20652" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126347", "reference_id": "126347", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/" } ], "url": "https://support.apple.com/en-us/126347" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448793", "reference_id": "2448793", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448793" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" } ], "aliases": [ "CVE-2026-20652" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w5gq-k53s-tuc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64211?format=api", "vulnerability_id": "VCID-wrt4-z8ne-zffm", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43457", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08959", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08968", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08899", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08977", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.09009", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08972", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09336", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43457" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448786", "reference_id": "2448786", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448786" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" } ], "aliases": [ "CVE-2025-43457" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wrt4-z8ne-zffm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64207?format=api", "vulnerability_id": "VCID-x5sh-5xtn-r7cp", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43214", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00147", "scoring_system": "epss", "scoring_elements": "0.3515", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.3696", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37121", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36948", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37013", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.37021", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00161", "scoring_system": "epss", "scoring_elements": "0.36986", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43214" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448782", "reference_id": "2448782", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448782" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" } ], "aliases": [ "CVE-2025-43214" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-x5sh-5xtn-r7cp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64214?format=api", "vulnerability_id": "VCID-yfww-r9rn-73dy", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20608", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02479", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02491", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02495", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.02515", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00014", "scoring_system": "epss", "scoring_elements": "0.0248", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-20608" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126346", "reference_id": "126346", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/" } ], "url": "https://support.apple.com/en-us/126346" }, { "reference_url": "https://support.apple.com/en-us/126347", "reference_id": "126347", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/" } ], "url": "https://support.apple.com/en-us/126347" }, { "reference_url": "https://support.apple.com/en-us/126348", "reference_id": "126348", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/" } ], "url": "https://support.apple.com/en-us/126348" }, { "reference_url": "https://support.apple.com/en-us/126353", "reference_id": "126353", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/" } ], "url": "https://support.apple.com/en-us/126353" }, { "reference_url": "https://support.apple.com/en-us/126354", "reference_id": "126354", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/" } ], "url": "https://support.apple.com/en-us/126354" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448789", "reference_id": "2448789", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448789" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" } ], "aliases": [ "CVE-2026-20608" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yfww-r9rn-73dy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/63945?format=api", "vulnerability_id": "VCID-zk2j-9hd2-hfcn", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28857", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11507", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11434", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11561", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11349", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11433", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1149", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11496", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11463", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2026-28857" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/126792", "reference_id": "126792", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/" } ], "url": "https://support.apple.com/en-us/126792" }, { "reference_url": "https://support.apple.com/en-us/126794", "reference_id": "126794", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/" } ], "url": "https://support.apple.com/en-us/126794" }, { "reference_url": "https://support.apple.com/en-us/126799", "reference_id": "126799", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/" } ], "url": "https://support.apple.com/en-us/126799" }, { "reference_url": "https://support.apple.com/en-us/126800", "reference_id": "126800", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/" } ], "url": "https://support.apple.com/en-us/126800" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453004", "reference_id": "2453004", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2453004" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995087?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1" }, { "url": "http://public2.vulnerablecode.io/api/packages/995089?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.52.1-1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.52.1-1" } ], "aliases": [ "CVE-2026-28857" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-zk2j-9hd2-hfcn" } ], "fixing_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61856?format=api", "vulnerability_id": "VCID-1vsk-e1mf-6uaz", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43216", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00103", "scoring_system": "epss", "scoring_elements": "0.28385", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29857", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.30035", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29849", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29912", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29948", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29953", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00113", "scoring_system": "epss", "scoring_elements": "0.29906", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124148", "reference_id": "124148", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124148" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386273", "reference_id": "2386273", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386273" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43216" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1vsk-e1mf-6uaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61837?format=api", "vulnerability_id": "VCID-1xcs-fpk3-nyg4", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44187", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67584", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67543", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67564", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67542", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67594", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67607", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.6763", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00539", "scoring_system": "epss", "scoring_elements": "0.67616", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44187" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121238", "reference_id": "121238", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/" } ], "url": "https://support.apple.com/en-us/121238" }, { "reference_url": "https://support.apple.com/en-us/121240", "reference_id": "121240", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/" } ], "url": "https://support.apple.com/en-us/121240" }, { "reference_url": "https://support.apple.com/en-us/121241", "reference_id": "121241", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/" } ], "url": "https://support.apple.com/en-us/121241" }, { "reference_url": "https://support.apple.com/en-us/121248", "reference_id": "121248", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/" } ], "url": "https://support.apple.com/en-us/121248" }, { "reference_url": "https://support.apple.com/en-us/121249", "reference_id": "121249", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/" } ], "url": "https://support.apple.com/en-us/121249" }, { "reference_url": "https://support.apple.com/en-us/121250", "reference_id": "121250", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/" } ], "url": "https://support.apple.com/en-us/121250" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706", "reference_id": "2314706", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9553", "reference_id": "RHSA-2024:9553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7079-1/", "reference_id": "USN-7079-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7079-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-44187" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-1xcs-fpk3-nyg4" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68448?format=api", "vulnerability_id": "VCID-23pb-y6g6-sbed", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24189", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75799", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75852", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75831", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75809", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75842", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75854", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75877", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00912", "scoring_system": "epss", "scoring_elements": "0.75859", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24189" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122066", "reference_id": "122066", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/" } ], "url": "https://support.apple.com/en-us/122066" }, { "reference_url": "https://support.apple.com/en-us/122068", "reference_id": "122068", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/" } ], "url": "https://support.apple.com/en-us/122068" }, { "reference_url": "https://support.apple.com/en-us/122071", "reference_id": "122071", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/" } ], "url": "https://support.apple.com/en-us/122071" }, { "reference_url": "https://support.apple.com/en-us/122072", "reference_id": "122072", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/" } ], "url": "https://support.apple.com/en-us/122072" }, { "reference_url": "https://support.apple.com/en-us/122073", "reference_id": "122073", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/" } ], "url": "https://support.apple.com/en-us/122073" }, { "reference_url": "https://support.apple.com/en-us/122074", "reference_id": "122074", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/" } ], "url": "https://support.apple.com/en-us/122074" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386267", "reference_id": "2386267", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386267" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3713", "reference_id": "RHSA-2025:3713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3755", "reference_id": "RHSA-2025:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3756", "reference_id": "RHSA-2025:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3974", "reference_id": "RHSA-2025:3974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4445", "reference_id": "RHSA-2025:4445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8064", "reference_id": "RHSA-2025:8064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8065", "reference_id": "RHSA-2025:8065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8066", "reference_id": "RHSA-2025:8066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8194", "reference_id": "RHSA-2025:8194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8194" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24189" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-23pb-y6g6-sbed" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66399?format=api", "vulnerability_id": "VCID-2hr6-uu49-1qb7", "summary": "webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13947", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00055", "scoring_system": "epss", "scoring_elements": "0.17412", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22368", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22443", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22464", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22423", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22519", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22307", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00074", "scoring_system": "epss", "scoring_elements": "0.22388", "published_at": "2026-04-08T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13947" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418576", "reference_id": "2418576", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418576" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7", "reference_id": "cpe:/o:redhat:rhel_els:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-13947", "reference_id": "CVE-2025-13947", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-13947" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [ { "value": "7.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7941-1/", "reference_id": "USN-7941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7941-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-13947" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.7", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2hr6-uu49-1qb7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61840?format=api", "vulnerability_id": "VCID-2nmg-6jk2-ebcb", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44296", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71183", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71143", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71161", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71136", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71178", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71191", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.71214", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00664", "scoring_system": "epss", "scoring_elements": "0.712", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44296" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121563", "reference_id": "121563", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/" } ], "url": "https://support.apple.com/en-us/121563" }, { "reference_url": "https://support.apple.com/en-us/121564", "reference_id": "121564", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/" } ], "url": "https://support.apple.com/en-us/121564" }, { "reference_url": "https://support.apple.com/en-us/121565", "reference_id": "121565", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/" } ], "url": "https://support.apple.com/en-us/121565" }, { "reference_url": "https://support.apple.com/en-us/121566", "reference_id": "121566", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/" } ], "url": "https://support.apple.com/en-us/121566" }, { "reference_url": "https://support.apple.com/en-us/121567", "reference_id": "121567", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/" } ], "url": "https://support.apple.com/en-us/121567" }, { "reference_url": "https://support.apple.com/en-us/121569", "reference_id": "121569", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/" } ], "url": "https://support.apple.com/en-us/121569" }, { "reference_url": "https://support.apple.com/en-us/121571", "reference_id": "121571", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/" } ], "url": "https://support.apple.com/en-us/121571" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289", "reference_id": "2323289", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9545", "reference_id": "RHSA-2024:9545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7113-1/", "reference_id": "USN-7113-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7113-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-44296" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "4.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2nmg-6jk2-ebcb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66451?format=api", "vulnerability_id": "VCID-2pgr-9muu-s3ge", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43443", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14982", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15169", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.14973", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15061", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15114", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15081", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15043", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00052", "scoring_system": "epss", "scoring_elements": "0.16305", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43443" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416337", "reference_id": "2416337", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416337" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43443" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgr-9muu-s3ge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61844?format=api", "vulnerability_id": "VCID-2rm2-f5xj-1bb2", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24208", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54584", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54598", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54577", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54629", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54623", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54636", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54619", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00315", "scoring_system": "epss", "scoring_elements": "0.54608", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24208" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122371", "reference_id": "122371", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/" } ], "url": "https://support.apple.com/en-us/122371" }, { "reference_url": "https://support.apple.com/en-us/122379", "reference_id": "122379", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/" } ], "url": "https://support.apple.com/en-us/122379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910", "reference_id": "2357910", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3713", "reference_id": "RHSA-2025:3713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3755", "reference_id": "RHSA-2025:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3756", "reference_id": "RHSA-2025:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3974", "reference_id": "RHSA-2025:3974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4445", "reference_id": "RHSA-2025:4445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7387", "reference_id": "RHSA-2025:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8064", "reference_id": "RHSA-2025:8064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8065", "reference_id": "RHSA-2025:8065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8066", "reference_id": "RHSA-2025:8066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8194", "reference_id": "RHSA-2025:8194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8194" }, { "reference_url": "https://usn.ubuntu.com/7436-1/", "reference_id": "USN-7436-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7436-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24208" ], "risk_score": 2.8, "exploitability": "0.5", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2rm2-f5xj-1bb2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72615?format=api", "vulnerability_id": "VCID-2vtf-gudd-9fah", "summary": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54479", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71986", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71947", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71966", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71943", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71982", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.71994", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72018", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.007", "scoring_system": "epss", "scoring_elements": "0.72001", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54479" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121837", "reference_id": "121837", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121837" }, { "reference_url": "https://support.apple.com/en-us/121838", "reference_id": "121838", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121838" }, { "reference_url": "https://support.apple.com/en-us/121839", "reference_id": "121839", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121839" }, { "reference_url": "https://support.apple.com/en-us/121843", "reference_id": "121843", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121843" }, { "reference_url": "https://support.apple.com/en-us/121844", "reference_id": "121844", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121844" }, { "reference_url": "https://support.apple.com/en-us/121845", "reference_id": "121845", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121845" }, { "reference_url": "https://support.apple.com/en-us/121846", "reference_id": "121846", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/" } ], "url": "https://support.apple.com/en-us/121846" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841", "reference_id": "2333841", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0145", "reference_id": "RHSA-2025:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0146", "reference_id": "RHSA-2025:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0226", "reference_id": "RHSA-2025:0226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0276", "reference_id": "RHSA-2025:0276", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0276" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0277", "reference_id": "RHSA-2025:0277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0278", "reference_id": "RHSA-2025:0278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0279", "reference_id": "RHSA-2025:0279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0282", "reference_id": "RHSA-2025:0282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0283", "reference_id": "RHSA-2025:0283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7201-1/", "reference_id": "USN-7201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-54479" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2vtf-gudd-9fah" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61836?format=api", "vulnerability_id": "VCID-3daw-8nh6-dfcq", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44185", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1148", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11549", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11603", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11392", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11476", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11535", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11545", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11511", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44185" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120909", "reference_id": "120909", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/" } ], "url": "https://support.apple.com/en-us/120909" }, { "reference_url": "https://support.apple.com/en-us/120911", "reference_id": "120911", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/" } ], "url": "https://support.apple.com/en-us/120911" }, { "reference_url": "https://support.apple.com/en-us/120913", "reference_id": "120913", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/" } ], "url": "https://support.apple.com/en-us/120913" }, { "reference_url": "https://support.apple.com/en-us/120914", "reference_id": "120914", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/" } ], "url": "https://support.apple.com/en-us/120914" }, { "reference_url": "https://support.apple.com/en-us/120915", "reference_id": "120915", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/" } ], "url": "https://support.apple.com/en-us/120915" }, { "reference_url": "https://support.apple.com/en-us/120916", "reference_id": "120916", "reference_type": "", "scores": [ { "value": "5.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/" } ], "url": "https://support.apple.com/en-us/120916" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263", "reference_id": "2323263", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9553", "reference_id": "RHSA-2024:9553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9637", "reference_id": "RHSA-2024:9637", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9637" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9638", "reference_id": "RHSA-2024:9638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9646", "reference_id": "RHSA-2024:9646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-44185" ], "risk_score": 2.5, "exploitability": "0.5", "weighted_severity": "5.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3daw-8nh6-dfcq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71950?format=api", "vulnerability_id": "VCID-3frv-ppjt-9bdy", "summary": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24143", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32688", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32555", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32723", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32544", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32592", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32618", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.3262", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00131", "scoring_system": "epss", "scoring_elements": "0.32581", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24143" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122066", "reference_id": "122066", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/" } ], "url": "https://support.apple.com/en-us/122066" }, { "reference_url": "https://support.apple.com/en-us/122068", "reference_id": "122068", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/" } ], "url": "https://support.apple.com/en-us/122068" }, { "reference_url": "https://support.apple.com/en-us/122073", "reference_id": "122073", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/" } ], "url": "https://support.apple.com/en-us/122073" }, { "reference_url": "https://support.apple.com/en-us/122074", "reference_id": "122074", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/" } ], "url": "https://support.apple.com/en-us/122074" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621", "reference_id": "2344621", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2034", "reference_id": "RHSA-2025:2034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2125", "reference_id": "RHSA-2025:2125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2125" }, { "reference_url": "https://usn.ubuntu.com/7279-1/", "reference_id": "USN-7279-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7279-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24143" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3frv-ppjt-9bdy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61852?format=api", "vulnerability_id": "VCID-3k6e-zz11-93bn", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31273", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26463", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.2833", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28524", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28318", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28384", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28427", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28431", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00104", "scoring_system": "epss", "scoring_elements": "0.28387", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31273" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386268", "reference_id": "2386268", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386268" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-31273" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-3k6e-zz11-93bn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61855?format=api", "vulnerability_id": "VCID-5q44-vqhn-zydx", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43212", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00085", "scoring_system": "epss", "scoring_elements": "0.24845", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26124", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26334", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26106", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26173", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26221", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26229", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00094", "scoring_system": "epss", "scoring_elements": "0.26184", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43212" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386271", "reference_id": "2386271", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386271" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43212" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5q44-vqhn-zydx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71951?format=api", "vulnerability_id": "VCID-5x1k-uam9-5bhs", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24162", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78697", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78741", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78728", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.7871", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78735", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78742", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78766", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01179", "scoring_system": "epss", "scoring_elements": "0.78749", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24162" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122066", "reference_id": "122066", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/" } ], "url": "https://support.apple.com/en-us/122066" }, { "reference_url": "https://support.apple.com/en-us/122068", "reference_id": "122068", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/" } ], "url": "https://support.apple.com/en-us/122068" }, { "reference_url": "https://support.apple.com/en-us/122071", "reference_id": "122071", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/" } ], "url": "https://support.apple.com/en-us/122071" }, { "reference_url": "https://support.apple.com/en-us/122072", "reference_id": "122072", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/" } ], "url": "https://support.apple.com/en-us/122072" }, { "reference_url": "https://support.apple.com/en-us/122073", "reference_id": "122073", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/" } ], "url": "https://support.apple.com/en-us/122073" }, { "reference_url": "https://support.apple.com/en-us/122074", "reference_id": "122074", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/" } ], "url": "https://support.apple.com/en-us/122074" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624", "reference_id": "2344624", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1957", "reference_id": "RHSA-2025:1957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1958", "reference_id": "RHSA-2025:1958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1959", "reference_id": "RHSA-2025:1959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1960", "reference_id": "RHSA-2025:1960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2034", "reference_id": "RHSA-2025:2034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2035", "reference_id": "RHSA-2025:2035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2121", "reference_id": "RHSA-2025:2121", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2121" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2125", "reference_id": "RHSA-2025:2125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2126", "reference_id": "RHSA-2025:2126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2126" }, { "reference_url": "https://usn.ubuntu.com/7279-1/", "reference_id": "USN-7279-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7279-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24162" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-5x1k-uam9-5bhs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65877?format=api", "vulnerability_id": "VCID-76jg-y2sa-f7cu", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43501", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22817", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22706", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22861", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22652", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22728", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22779", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22801", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00076", "scoring_system": "epss", "scoring_elements": "0.22763", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43501" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423185", "reference_id": "2423185", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423185" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43501" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-76jg-y2sa-f7cu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61841?format=api", "vulnerability_id": "VCID-7gyr-mvmk-pfh9", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54467", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40598", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40626", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40607", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40547", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00187", "scoring_system": "epss", "scoring_elements": "0.40625", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43206", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00208", "scoring_system": "epss", "scoring_elements": "0.43221", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54467" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121238", "reference_id": "121238", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/" } ], "url": "https://support.apple.com/en-us/121238" }, { "reference_url": "https://support.apple.com/en-us/121240", "reference_id": "121240", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/" } ], "url": "https://support.apple.com/en-us/121240" }, { "reference_url": "https://support.apple.com/en-us/121241", "reference_id": "121241", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/" } ], "url": "https://support.apple.com/en-us/121241" }, { "reference_url": "https://support.apple.com/en-us/121248", "reference_id": "121248", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/" } ], "url": "https://support.apple.com/en-us/121248" }, { "reference_url": "https://support.apple.com/en-us/121249", "reference_id": "121249", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/" } ], "url": "https://support.apple.com/en-us/121249" }, { "reference_url": "https://support.apple.com/en-us/121250", "reference_id": "121250", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/" } ], "url": "https://support.apple.com/en-us/121250" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872", "reference_id": "2353872", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3713", "reference_id": "RHSA-2025:3713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3755", "reference_id": "RHSA-2025:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3756", "reference_id": "RHSA-2025:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3974", "reference_id": "RHSA-2025:3974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4445", "reference_id": "RHSA-2025:4445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7387", "reference_id": "RHSA-2025:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8064", "reference_id": "RHSA-2025:8064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8065", "reference_id": "RHSA-2025:8065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8066", "reference_id": "RHSA-2025:8066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8194", "reference_id": "RHSA-2025:8194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8194" }, { "reference_url": "https://usn.ubuntu.com/7395-1/", "reference_id": "USN-7395-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7395-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-54467" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7gyr-mvmk-pfh9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66445?format=api", "vulnerability_id": "VCID-7j7p-hnbd-hudk", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43429", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13604", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13785", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13587", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13719", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13689", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13653", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00046", "scoring_system": "epss", "scoring_elements": "0.14338", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43429" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416330", "reference_id": "2416330", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416330" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43429" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-7j7p-hnbd-hudk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72614?format=api", "vulnerability_id": "VCID-9j6k-np3x-23f7", "summary": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54508", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80301", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80278", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80266", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80293", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80304", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80323", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01383", "scoring_system": "epss", "scoring_elements": "0.80308", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01438", "scoring_system": "epss", "scoring_elements": "0.80656", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54508" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121837", "reference_id": "121837", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121837" }, { "reference_url": "https://support.apple.com/en-us/121839", "reference_id": "121839", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121839" }, { "reference_url": "https://support.apple.com/en-us/121843", "reference_id": "121843", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121843" }, { "reference_url": "https://support.apple.com/en-us/121844", "reference_id": "121844", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121844" }, { "reference_url": "https://support.apple.com/en-us/121845", "reference_id": "121845", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121845" }, { "reference_url": "https://support.apple.com/en-us/121846", "reference_id": "121846", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/121846" }, { "reference_url": "https://support.apple.com/en-us/122372", "reference_id": "122372", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/" } ], "url": "https://support.apple.com/en-us/122372" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845", "reference_id": "2333845", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0145", "reference_id": "RHSA-2025:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0146", "reference_id": "RHSA-2025:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0226", "reference_id": "RHSA-2025:0226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0276", "reference_id": "RHSA-2025:0276", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0276" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0277", "reference_id": "RHSA-2025:0277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0278", "reference_id": "RHSA-2025:0278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0279", "reference_id": "RHSA-2025:0279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0282", "reference_id": "RHSA-2025:0282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0283", "reference_id": "RHSA-2025:0283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7201-1/", "reference_id": "USN-7201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-54508" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-9j6k-np3x-23f7" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66446?format=api", "vulnerability_id": "VCID-ahcu-937r-57fu", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43430", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.2633", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26528", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26308", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26376", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26426", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26434", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00095", "scoring_system": "epss", "scoring_elements": "0.26388", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00099", "scoring_system": "epss", "scoring_elements": "0.27201", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43430" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416331", "reference_id": "2416331", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416331" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43430" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ahcu-937r-57fu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67451?format=api", "vulnerability_id": "VCID-aqvh-emss-bufx", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43368", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14812", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14617", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14706", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14765", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15105", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17153", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17106", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00054", "scoring_system": "epss", "scoring_elements": "0.17045", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43368" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397630", "reference_id": "2397630", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397630" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20922", "reference_id": "RHSA-2025:20922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20922" }, { "reference_url": "https://usn.ubuntu.com/7817-1/", "reference_id": "USN-7817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7817-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43368" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-aqvh-emss-bufx" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66442?format=api", "vulnerability_id": "VCID-az2z-2mnu-sfbh", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43419", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10526", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10411", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10484", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10552", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10581", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10548", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00037", "scoring_system": "epss", "scoring_elements": "0.11092", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43419" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://support.apple.com/en-us/125114", "reference_id": "125114", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/" } ], "url": "https://support.apple.com/en-us/125114" }, { "reference_url": "https://support.apple.com/en-us/125115", "reference_id": "125115", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/" } ], "url": "https://support.apple.com/en-us/125115" }, { "reference_url": "https://support.apple.com/en-us/125116", "reference_id": "125116", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/" } ], "url": "https://support.apple.com/en-us/125116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416326", "reference_id": "2416326", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416326" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43419" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-az2z-2mnu-sfbh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61843?format=api", "vulnerability_id": "VCID-azef-hxum-z3eb", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24201", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0008", "scoring_system": "epss", "scoring_elements": "0.23536", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24888", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24922", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24969", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24983", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00087", "scoring_system": "epss", "scoring_elements": "0.24943", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00098", "scoring_system": "epss", "scoring_elements": "0.27125", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24201" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122281", "reference_id": "122281", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/" } ], "url": "https://support.apple.com/en-us/122281" }, { "reference_url": "https://support.apple.com/en-us/122283", "reference_id": "122283", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/" } ], "url": "https://support.apple.com/en-us/122283" }, { "reference_url": "https://support.apple.com/en-us/122284", "reference_id": "122284", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/" } ], "url": "https://support.apple.com/en-us/122284" }, { "reference_url": "https://support.apple.com/en-us/122285", "reference_id": "122285", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/" } ], "url": "https://support.apple.com/en-us/122285" }, { "reference_url": "https://support.apple.com/en-us/122345", "reference_id": "122345", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/" } ], "url": "https://support.apple.com/en-us/122345" }, { "reference_url": "https://support.apple.com/en-us/122346", "reference_id": "122346", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/" } ], "url": "https://support.apple.com/en-us/122346" }, { "reference_url": "https://support.apple.com/en-us/122372", "reference_id": "122372", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/" } ], "url": "https://support.apple.com/en-us/122372" }, { "reference_url": "https://support.apple.com/en-us/122376", "reference_id": "122376", "reference_type": "", "scores": [ { "value": "10", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" }, { "value": "Act", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/" } ], "url": "https://support.apple.com/en-us/122376" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802", "reference_id": "2351802", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2863", "reference_id": "RHSA-2025:2863", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2863" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2864", "reference_id": "RHSA-2025:2864", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2864" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2997", "reference_id": "RHSA-2025:2997", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2997" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2998", "reference_id": "RHSA-2025:2998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3000", "reference_id": "RHSA-2025:3000", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3000" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3001", "reference_id": "RHSA-2025:3001", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3001" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3002", "reference_id": "RHSA-2025:3002", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3002" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3005", "reference_id": "RHSA-2025:3005", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3005" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3034", "reference_id": "RHSA-2025:3034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3034" }, { "reference_url": "https://usn.ubuntu.com/7395-1/", "reference_id": "USN-7395-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7395-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24201" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-azef-hxum-z3eb" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72611?format=api", "vulnerability_id": "VCID-b3dw-sj5b-5bhr", "summary": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54502", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.05739", "scoring_system": "epss", "scoring_elements": "0.9041", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.9167", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.91637", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.91645", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.91658", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.91664", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.07285", "scoring_system": "epss", "scoring_elements": "0.91667", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54502" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121837", "reference_id": "121837", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121837" }, { "reference_url": "https://support.apple.com/en-us/121839", "reference_id": "121839", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121839" }, { "reference_url": "https://support.apple.com/en-us/121843", "reference_id": "121843", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121843" }, { "reference_url": "https://support.apple.com/en-us/121844", "reference_id": "121844", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121844" }, { "reference_url": "https://support.apple.com/en-us/121845", "reference_id": "121845", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121845" }, { "reference_url": "https://support.apple.com/en-us/121846", "reference_id": "121846", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/" } ], "url": "https://support.apple.com/en-us/121846" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843", "reference_id": "2333843", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0145", "reference_id": "RHSA-2025:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0146", "reference_id": "RHSA-2025:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0226", "reference_id": "RHSA-2025:0226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0276", "reference_id": "RHSA-2025:0276", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0276" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0277", "reference_id": "RHSA-2025:0277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0278", "reference_id": "RHSA-2025:0278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0279", "reference_id": "RHSA-2025:0279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0282", "reference_id": "RHSA-2025:0282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0283", "reference_id": "RHSA-2025:0283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7201-1/", "reference_id": "USN-7201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-54502" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b3dw-sj5b-5bhr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71949?format=api", "vulnerability_id": "VCID-b8ws-1k92-7bhq", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54543", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00134", "scoring_system": "epss", "scoring_elements": "0.33157", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.3462", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.3473", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34607", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34651", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34679", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34683", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34644", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54543" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121837", "reference_id": "121837", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121837" }, { "reference_url": "https://support.apple.com/en-us/121839", "reference_id": "121839", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121839" }, { "reference_url": "https://support.apple.com/en-us/121843", "reference_id": "121843", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121843" }, { "reference_url": "https://support.apple.com/en-us/121844", "reference_id": "121844", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121844" }, { "reference_url": "https://support.apple.com/en-us/121845", "reference_id": "121845", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121845" }, { "reference_url": "https://support.apple.com/en-us/121846", "reference_id": "121846", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/121846" }, { "reference_url": "https://support.apple.com/en-us/122372", "reference_id": "122372", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/" } ], "url": "https://support.apple.com/en-us/122372" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619", "reference_id": "2344619", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1957", "reference_id": "RHSA-2025:1957", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1957" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1958", "reference_id": "RHSA-2025:1958", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1958" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1959", "reference_id": "RHSA-2025:1959", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1959" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:1960", "reference_id": "RHSA-2025:1960", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:1960" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2034", "reference_id": "RHSA-2025:2034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2035", "reference_id": "RHSA-2025:2035", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2035" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2121", "reference_id": "RHSA-2025:2121", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2121" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2125", "reference_id": "RHSA-2025:2125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2126", "reference_id": "RHSA-2025:2126", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2126" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-54543" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ws-1k92-7bhq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64209?format=api", "vulnerability_id": "VCID-bjtx-twmy-jbgk", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43438", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10694", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1063", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10703", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1158", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43438" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448784", "reference_id": "2448784", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448784" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43438" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bjtx-twmy-jbgk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61847?format=api", "vulnerability_id": "VCID-bkcz-d48v-7uca", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24213", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31973", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31846", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.32016", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31836", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31888", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31916", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31921", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00126", "scoring_system": "epss", "scoring_elements": "0.31881", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24213" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122404", "reference_id": "122404", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/" } ], "url": "https://support.apple.com/en-us/122404" }, { "reference_url": "https://support.apple.com/en-us/122405", "reference_id": "122405", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/" } ], "url": "https://support.apple.com/en-us/122405" }, { "reference_url": "https://support.apple.com/en-us/122716", "reference_id": "122716", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/" } ], "url": "https://support.apple.com/en-us/122716" }, { "reference_url": "https://support.apple.com/en-us/122719", "reference_id": "122719", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/" } ], "url": "https://support.apple.com/en-us/122719" }, { "reference_url": "https://support.apple.com/en-us/122720", "reference_id": "122720", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/" } ], "url": "https://support.apple.com/en-us/122720" }, { "reference_url": "https://support.apple.com/en-us/122721", "reference_id": "122721", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/" } ], "url": "https://support.apple.com/en-us/122721" }, { "reference_url": "https://support.apple.com/en-us/122722", "reference_id": "122722", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/" } ], "url": "https://support.apple.com/en-us/122722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913", "reference_id": "2357913", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7436-1/", "reference_id": "USN-7436-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7436-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24213" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcz-d48v-7uca" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69654?format=api", "vulnerability_id": "VCID-c4np-b4zq-tkch", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31204", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71229", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71188", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71206", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71181", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71223", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71237", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.7126", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00666", "scoring_system": "epss", "scoring_elements": "0.71245", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31204" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122404", "reference_id": "122404", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/" } ], "url": "https://support.apple.com/en-us/122404" }, { "reference_url": "https://support.apple.com/en-us/122716", "reference_id": "122716", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/" } ], "url": "https://support.apple.com/en-us/122716" }, { "reference_url": "https://support.apple.com/en-us/122719", "reference_id": "122719", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/" } ], "url": "https://support.apple.com/en-us/122719" }, { "reference_url": "https://support.apple.com/en-us/122720", "reference_id": "122720", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/" } ], "url": "https://support.apple.com/en-us/122720" }, { "reference_url": "https://support.apple.com/en-us/122721", "reference_id": "122721", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/" } ], "url": "https://support.apple.com/en-us/122721" }, { "reference_url": "https://support.apple.com/en-us/122722", "reference_id": "122722", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/" } ], "url": "https://support.apple.com/en-us/122722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500", "reference_id": "2366500", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "reference_url": "https://security.archlinux.org/AVG-2863", "reference_id": "AVG-2863", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2863" }, { "reference_url": "https://security.archlinux.org/AVG-2864", "reference_id": "AVG-2864", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2864" }, { "reference_url": "https://security.archlinux.org/AVG-2865", "reference_id": "AVG-2865", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2865" }, { "reference_url": "https://security.archlinux.org/AVG-2866", "reference_id": "AVG-2866", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4201", "reference_id": "RHSA-2023:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4202", "reference_id": "RHSA-2023:4202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7566-1/", "reference_id": "USN-7566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7566-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-31204" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c4np-b4zq-tkch" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69657?format=api", "vulnerability_id": "VCID-c9mb-24v2-q3ba", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31215", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78251", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78203", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78233", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78215", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78247", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78272", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01121", "scoring_system": "epss", "scoring_elements": "0.78256", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31215" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122404", "reference_id": "122404", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/" } ], "url": "https://support.apple.com/en-us/122404" }, { "reference_url": "https://support.apple.com/en-us/122405", "reference_id": "122405", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/" } ], "url": "https://support.apple.com/en-us/122405" }, { "reference_url": "https://support.apple.com/en-us/122716", "reference_id": "122716", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/" } ], "url": "https://support.apple.com/en-us/122716" }, { "reference_url": "https://support.apple.com/en-us/122719", "reference_id": "122719", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/" } ], "url": "https://support.apple.com/en-us/122719" }, { "reference_url": "https://support.apple.com/en-us/122720", "reference_id": "122720", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/" } ], "url": "https://support.apple.com/en-us/122720" }, { "reference_url": "https://support.apple.com/en-us/122721", "reference_id": "122721", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/" } ], "url": "https://support.apple.com/en-us/122721" }, { "reference_url": "https://support.apple.com/en-us/122722", "reference_id": "122722", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/" } ], "url": "https://support.apple.com/en-us/122722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503", "reference_id": "2366503", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "reference_url": "https://security.archlinux.org/AVG-2863", "reference_id": "AVG-2863", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2863" }, { "reference_url": "https://security.archlinux.org/AVG-2864", "reference_id": "AVG-2864", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2864" }, { "reference_url": "https://security.archlinux.org/AVG-2865", "reference_id": "AVG-2865", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2865" }, { "reference_url": "https://security.archlinux.org/AVG-2866", "reference_id": "AVG-2866", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4201", "reference_id": "RHSA-2023:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4202", "reference_id": "RHSA-2023:4202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7566-1/", "reference_id": "USN-7566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7566-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-31215" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mb-24v2-q3ba" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61842?format=api", "vulnerability_id": "VCID-cmdy-ztbw-jffq", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54551", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66155", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66123", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.6615", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66118", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66167", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.6618", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66199", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00504", "scoring_system": "epss", "scoring_elements": "0.66186", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54551" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/120909", "reference_id": "120909", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/" } ], "url": "https://support.apple.com/en-us/120909" }, { "reference_url": "https://support.apple.com/en-us/120911", "reference_id": "120911", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/" } ], "url": "https://support.apple.com/en-us/120911" }, { "reference_url": "https://support.apple.com/en-us/120913", "reference_id": "120913", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/" } ], "url": "https://support.apple.com/en-us/120913" }, { "reference_url": "https://support.apple.com/en-us/120914", "reference_id": "120914", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/" } ], "url": "https://support.apple.com/en-us/120914" }, { "reference_url": "https://support.apple.com/en-us/120915", "reference_id": "120915", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/" } ], "url": "https://support.apple.com/en-us/120915" }, { "reference_url": "https://support.apple.com/en-us/120916", "reference_id": "120916", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/" } ], "url": "https://support.apple.com/en-us/120916" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909", "reference_id": "2357909", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3713", "reference_id": "RHSA-2025:3713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3755", "reference_id": "RHSA-2025:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3756", "reference_id": "RHSA-2025:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3974", "reference_id": "RHSA-2025:3974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4445", "reference_id": "RHSA-2025:4445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7387", "reference_id": "RHSA-2025:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8064", "reference_id": "RHSA-2025:8064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8065", "reference_id": "RHSA-2025:8065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8066", "reference_id": "RHSA-2025:8066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8194", "reference_id": "RHSA-2025:8194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8194" }, { "reference_url": "https://usn.ubuntu.com/7436-1/", "reference_id": "USN-7436-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7436-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-54551" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cmdy-ztbw-jffq" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61849?format=api", "vulnerability_id": "VCID-cw56-pdyr-fbge", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24216", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00821", "scoring_system": "epss", "scoring_elements": "0.74363", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00821", "scoring_system": "epss", "scoring_elements": "0.74405", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00821", "scoring_system": "epss", "scoring_elements": "0.7439", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00821", "scoring_system": "epss", "scoring_elements": "0.74364", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00821", "scoring_system": "epss", "scoring_elements": "0.74397", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00821", "scoring_system": "epss", "scoring_elements": "0.74412", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00821", "scoring_system": "epss", "scoring_elements": "0.74433", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00821", "scoring_system": "epss", "scoring_elements": "0.74413", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24216" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122371", "reference_id": "122371", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/" } ], "url": "https://support.apple.com/en-us/122371" }, { "reference_url": "https://support.apple.com/en-us/122372", "reference_id": "122372", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/" } ], "url": "https://support.apple.com/en-us/122372" }, { "reference_url": "https://support.apple.com/en-us/122373", "reference_id": "122373", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/" } ], "url": "https://support.apple.com/en-us/122373" }, { "reference_url": "https://support.apple.com/en-us/122377", "reference_id": "122377", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/" } ], "url": "https://support.apple.com/en-us/122377" }, { "reference_url": "https://support.apple.com/en-us/122378", "reference_id": "122378", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/" } ], "url": "https://support.apple.com/en-us/122378" }, { "reference_url": "https://support.apple.com/en-us/122379", "reference_id": "122379", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/" } ], "url": "https://support.apple.com/en-us/122379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917", "reference_id": "2357917", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3713", "reference_id": "RHSA-2025:3713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3755", "reference_id": "RHSA-2025:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3756", "reference_id": "RHSA-2025:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3974", "reference_id": "RHSA-2025:3974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4445", "reference_id": "RHSA-2025:4445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7387", "reference_id": "RHSA-2025:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7998", "reference_id": "RHSA-2025:7998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8064", "reference_id": "RHSA-2025:8064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8065", "reference_id": "RHSA-2025:8065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8066", "reference_id": "RHSA-2025:8066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8194", "reference_id": "RHSA-2025:8194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8194" }, { "reference_url": "https://usn.ubuntu.com/7436-1/", "reference_id": "USN-7436-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7436-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24216" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-cw56-pdyr-fbge" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72793?format=api", "vulnerability_id": "VCID-dd4q-8fs5-3kej", "summary": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44308", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01547", "scoring_system": "epss", "scoring_elements": "0.81399", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01547", "scoring_system": "epss", "scoring_elements": "0.81343", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01547", "scoring_system": "epss", "scoring_elements": "0.81366", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01547", "scoring_system": "epss", "scoring_elements": "0.81364", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01547", "scoring_system": "epss", "scoring_elements": "0.81393", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01547", "scoring_system": "epss", "scoring_elements": "0.81397", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01547", "scoring_system": "epss", "scoring_elements": "0.81419", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01547", "scoring_system": "epss", "scoring_elements": "0.81406", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44308" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121752", "reference_id": "121752", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/" } ], "url": "https://support.apple.com/en-us/121752" }, { "reference_url": "https://support.apple.com/en-us/121753", "reference_id": "121753", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/" } ], "url": "https://support.apple.com/en-us/121753" }, { "reference_url": "https://support.apple.com/en-us/121754", "reference_id": "121754", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/" } ], "url": "https://support.apple.com/en-us/121754" }, { "reference_url": "https://support.apple.com/en-us/121755", "reference_id": "121755", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/" } ], "url": "https://support.apple.com/en-us/121755" }, { "reference_url": "https://support.apple.com/en-us/121756", "reference_id": "121756", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/" } ], "url": "https://support.apple.com/en-us/121756" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931", "reference_id": "2327931", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7142-1/", "reference_id": "USN-7142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7142-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-44308" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dd4q-8fs5-3kej" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65878?format=api", "vulnerability_id": "VCID-dvx9-km9t-yqfv", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43531", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30817", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30687", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30865", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30683", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30742", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30774", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30777", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00118", "scoring_system": "epss", "scoring_elements": "0.30733", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43531" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125889", "reference_id": "125889", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125889" }, { "reference_url": "https://support.apple.com/en-us/125890", "reference_id": "125890", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125890" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "3.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423187", "reference_id": "2423187", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423187" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43531" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-dvx9-km9t-yqfv" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67448?format=api", "vulnerability_id": "VCID-ednn-ppw1-myfk", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43272", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00047", "scoring_system": "epss", "scoring_elements": "0.14693", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19812", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19667", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19614", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19534", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21985", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22086", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22045", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43272" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://support.apple.com/en-us/125115", "reference_id": "125115", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/" } ], "url": "https://support.apple.com/en-us/125115" }, { "reference_url": "https://support.apple.com/en-us/125116", "reference_id": "125116", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/" } ], "url": "https://support.apple.com/en-us/125116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397626", "reference_id": "2397626", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397626" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20922", "reference_id": "RHSA-2025:20922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20922" }, { "reference_url": "https://usn.ubuntu.com/7817-1/", "reference_id": "USN-7817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7817-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43272" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ednn-ppw1-myfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66367?format=api", "vulnerability_id": "VCID-ems1-41u6-vbex", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43458", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21944", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22117", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21892", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.21974", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22029", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22044", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00072", "scoring_system": "epss", "scoring_elements": "0.22003", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00075", "scoring_system": "epss", "scoring_elements": "0.22678", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43458" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418855", "reference_id": "2418855", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418855" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7941-1/", "reference_id": "USN-7941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7941-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43458" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ems1-41u6-vbex" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66453?format=api", "vulnerability_id": "VCID-epzj-t14z-43d2", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43421", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08307", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08327", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08272", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08336", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08353", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08344", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08324", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08623", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43421" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416355", "reference_id": "2416355", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416355" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7941-1/", "reference_id": "USN-7941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7941-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43421" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-epzj-t14z-43d2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69656?format=api", "vulnerability_id": "VCID-ey9n-zksh-mbfm", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31206", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78151", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78103", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78116", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78142", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78148", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78173", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01111", "scoring_system": "epss", "scoring_elements": "0.78155", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31206" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122404", "reference_id": "122404", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/" } ], "url": "https://support.apple.com/en-us/122404" }, { "reference_url": "https://support.apple.com/en-us/122405", "reference_id": "122405", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/" } ], "url": "https://support.apple.com/en-us/122405" }, { "reference_url": "https://support.apple.com/en-us/122716", "reference_id": "122716", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/" } ], "url": "https://support.apple.com/en-us/122716" }, { "reference_url": "https://support.apple.com/en-us/122719", "reference_id": "122719", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/" } ], "url": "https://support.apple.com/en-us/122719" }, { "reference_url": "https://support.apple.com/en-us/122720", "reference_id": "122720", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/" } ], "url": "https://support.apple.com/en-us/122720" }, { "reference_url": "https://support.apple.com/en-us/122721", "reference_id": "122721", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/" } ], "url": "https://support.apple.com/en-us/122721" }, { "reference_url": "https://support.apple.com/en-us/122722", "reference_id": "122722", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/" } ], "url": "https://support.apple.com/en-us/122722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502", "reference_id": "2366502", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "reference_url": "https://security.archlinux.org/AVG-2863", "reference_id": "AVG-2863", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2863" }, { "reference_url": "https://security.archlinux.org/AVG-2864", "reference_id": "AVG-2864", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2864" }, { "reference_url": "https://security.archlinux.org/AVG-2865", "reference_id": "AVG-2865", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2865" }, { "reference_url": "https://security.archlinux.org/AVG-2866", "reference_id": "AVG-2866", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4201", "reference_id": "RHSA-2023:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4202", "reference_id": "RHSA-2023:4202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7566-1/", "reference_id": "USN-7566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7566-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-31206" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ey9n-zksh-mbfm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69658?format=api", "vulnerability_id": "VCID-fzqz-yfn1-7yfd", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31257", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.7403", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.73989", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74015", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.73986", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.7402", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74034", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74056", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00799", "scoring_system": "epss", "scoring_elements": "0.74037", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31257" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122404", "reference_id": "122404", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/" } ], "url": "https://support.apple.com/en-us/122404" }, { "reference_url": "https://support.apple.com/en-us/122716", "reference_id": "122716", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/" } ], "url": "https://support.apple.com/en-us/122716" }, { "reference_url": "https://support.apple.com/en-us/122719", "reference_id": "122719", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/" } ], "url": "https://support.apple.com/en-us/122719" }, { "reference_url": "https://support.apple.com/en-us/122720", "reference_id": "122720", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/" } ], "url": "https://support.apple.com/en-us/122720" }, { "reference_url": "https://support.apple.com/en-us/122721", "reference_id": "122721", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/" } ], "url": "https://support.apple.com/en-us/122721" }, { "reference_url": "https://support.apple.com/en-us/122722", "reference_id": "122722", "reference_type": "", "scores": [ { "value": "4.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/" } ], "url": "https://support.apple.com/en-us/122722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504", "reference_id": "2366504", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "reference_url": "https://security.archlinux.org/AVG-2863", "reference_id": "AVG-2863", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2863" }, { "reference_url": "https://security.archlinux.org/AVG-2864", "reference_id": "AVG-2864", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2864" }, { "reference_url": "https://security.archlinux.org/AVG-2865", "reference_id": "AVG-2865", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2865" }, { "reference_url": "https://security.archlinux.org/AVG-2866", "reference_id": "AVG-2866", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7995", "reference_id": "RHSA-2025:7995", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7995" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8046", "reference_id": "RHSA-2025:8046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8530", "reference_id": "RHSA-2025:8530", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8530" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8532", "reference_id": "RHSA-2025:8532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8533", "reference_id": "RHSA-2025:8533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8534", "reference_id": "RHSA-2025:8534", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8534" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8541", "reference_id": "RHSA-2025:8541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8600", "reference_id": "RHSA-2025:8600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8600" }, { "reference_url": "https://usn.ubuntu.com/7566-1/", "reference_id": "USN-7566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7566-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-31257" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-fzqz-yfn1-7yfd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66443?format=api", "vulnerability_id": "VCID-gqjq-p4re-gkf6", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43425", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10253", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10315", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10345", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10752", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43425" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416327", "reference_id": "2416327", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43425" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gqjq-p4re-gkf6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64205?format=api", "vulnerability_id": "VCID-gwt6-n8ue-mqcf", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31277", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.3912", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39173", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39092", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39147", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39163", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39175", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00176", "scoring_system": "epss", "scoring_elements": "0.39139", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00192", "scoring_system": "epss", "scoring_elements": "0.4111", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31277" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448780", "reference_id": "2448780", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-31277" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-gwt6-n8ue-mqcf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71948?format=api", "vulnerability_id": "VCID-hp6k-spzk-vbaa", "summary": "webkitgtk: Copying a URL from Web Inspector may lead to command injection", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24150", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53944", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.5401", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53971", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53947", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53999", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.53998", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54045", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00308", "scoring_system": "epss", "scoring_elements": "0.54028", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24150" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122066", "reference_id": "122066", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/" } ], "url": "https://support.apple.com/en-us/122066" }, { "reference_url": "https://support.apple.com/en-us/122068", "reference_id": "122068", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/" } ], "url": "https://support.apple.com/en-us/122068" }, { "reference_url": "https://support.apple.com/en-us/122074", "reference_id": "122074", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/" } ], "url": "https://support.apple.com/en-us/122074" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622", "reference_id": "2344622", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2034", "reference_id": "RHSA-2025:2034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2125", "reference_id": "RHSA-2025:2125", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2125" }, { "reference_url": "https://usn.ubuntu.com/7279-1/", "reference_id": "USN-7279-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7279-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24150" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hp6k-spzk-vbaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61860?format=api", "vulnerability_id": "VCID-hvj6-wsg9-1bhg", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43265", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04829", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0543", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05414", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05422", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05457", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05478", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.0545", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0002", "scoring_system": "epss", "scoring_elements": "0.05436", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43265" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386276", "reference_id": "2386276", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386276" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43265" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hvj6-wsg9-1bhg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65881?format=api", "vulnerability_id": "VCID-j31g-7h17-27c8", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43541", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13378", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13255", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13443", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13239", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13321", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13373", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13342", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13304", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43541" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423191", "reference_id": "2423191", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423191" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43541" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-j31g-7h17-27c8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64204?format=api", "vulnerability_id": "VCID-jbuw-yp7v-4fcz", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31223", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66868", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66859", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66831", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66881", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66894", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.66914", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00522", "scoring_system": "epss", "scoring_elements": "0.669", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00534", "scoring_system": "epss", "scoring_elements": "0.67378", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122404", "reference_id": "122404", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122404" }, { "reference_url": "https://support.apple.com/en-us/122716", "reference_id": "122716", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122716" }, { "reference_url": "https://support.apple.com/en-us/122719", "reference_id": "122719", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122719" }, { "reference_url": "https://support.apple.com/en-us/122720", "reference_id": "122720", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122720" }, { "reference_url": "https://support.apple.com/en-us/122721", "reference_id": "122721", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122721" }, { "reference_url": "https://support.apple.com/en-us/122722", "reference_id": "122722", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/" } ], "url": "https://support.apple.com/en-us/122722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448779", "reference_id": "2448779", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448779" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-31223" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jbuw-yp7v-4fcz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66054?format=api", "vulnerability_id": "VCID-jyw2-fu8s-3fha", "summary": "Google Chrome: chromium: webkitgtk: Out of bounds memory access via crafted HTML page", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14174", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75156", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75187", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75163", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.75198", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00871", "scoring_system": "epss", "scoring_elements": "0.7521", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75838", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0091", "scoring_system": "epss", "scoring_elements": "0.75819", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.01047", "scoring_system": "epss", "scoring_elements": "0.77501", "published_at": "2026-04-13T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-14174" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421824", "reference_id": "2421824", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2421824" }, { "reference_url": "https://issues.chromium.org/issues/466192044", "reference_id": "466192044", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/" } ], "url": "https://issues.chromium.org/issues/466192044" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html", "reference_id": "stable-channel-update-for-desktop_10.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/" } ], "url": "https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-14174" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jyw2-fu8s-3fha" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69653?format=api", "vulnerability_id": "VCID-kdvu-rhgt-xqat", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24223", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45855", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45831", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45853", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45803", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45859", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45856", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45878", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0023", "scoring_system": "epss", "scoring_elements": "0.45848", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24223" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122404", "reference_id": "122404", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/" } ], "url": "https://support.apple.com/en-us/122404" }, { "reference_url": "https://support.apple.com/en-us/122716", "reference_id": "122716", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/" } ], "url": "https://support.apple.com/en-us/122716" }, { "reference_url": "https://support.apple.com/en-us/122719", "reference_id": "122719", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/" } ], "url": "https://support.apple.com/en-us/122719" }, { "reference_url": "https://support.apple.com/en-us/122720", "reference_id": "122720", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/" } ], "url": "https://support.apple.com/en-us/122720" }, { "reference_url": "https://support.apple.com/en-us/122721", "reference_id": "122721", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/" } ], "url": "https://support.apple.com/en-us/122721" }, { "reference_url": "https://support.apple.com/en-us/122722", "reference_id": "122722", "reference_type": "", "scores": [ { "value": "8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/" } ], "url": "https://support.apple.com/en-us/122722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499", "reference_id": "2366499", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "reference_url": "https://security.archlinux.org/AVG-2863", "reference_id": "AVG-2863", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2863" }, { "reference_url": "https://security.archlinux.org/AVG-2864", "reference_id": "AVG-2864", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2864" }, { "reference_url": "https://security.archlinux.org/AVG-2865", "reference_id": "AVG-2865", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2865" }, { "reference_url": "https://security.archlinux.org/AVG-2866", "reference_id": "AVG-2866", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4201", "reference_id": "RHSA-2023:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4202", "reference_id": "RHSA-2023:4202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7566-1/", "reference_id": "USN-7566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7566-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24223" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kdvu-rhgt-xqat" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/69655?format=api", "vulnerability_id": "VCID-ksq5-ygcp-nbaz", "summary": "webkitgtk: A malicious website may exfiltrate data cross-origin", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31205", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37915", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37994", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38019", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37898", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37949", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37961", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37978", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.3794", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31205" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122404", "reference_id": "122404", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/122404" }, { "reference_url": "https://support.apple.com/en-us/122716", "reference_id": "122716", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/122716" }, { "reference_url": "https://support.apple.com/en-us/122719", "reference_id": "122719", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/122719" }, { "reference_url": "https://support.apple.com/en-us/122720", "reference_id": "122720", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/122720" }, { "reference_url": "https://support.apple.com/en-us/122721", "reference_id": "122721", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/122721" }, { "reference_url": "https://support.apple.com/en-us/122722", "reference_id": "122722", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/" } ], "url": "https://support.apple.com/en-us/122722" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501", "reference_id": "2366501", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "reference_url": "https://security.archlinux.org/AVG-2863", "reference_id": "AVG-2863", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2863" }, { "reference_url": "https://security.archlinux.org/AVG-2864", "reference_id": "AVG-2864", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2864" }, { "reference_url": "https://security.archlinux.org/AVG-2865", "reference_id": "AVG-2865", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2865" }, { "reference_url": "https://security.archlinux.org/AVG-2866", "reference_id": "AVG-2866", "reference_type": "", "scores": [ { "value": "High", "scoring_system": "archlinux", "scoring_elements": "" } ], "url": "https://security.archlinux.org/AVG-2866" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7995", "reference_id": "RHSA-2025:7995", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7995" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8046", "reference_id": "RHSA-2025:8046", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8046" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8530", "reference_id": "RHSA-2025:8530", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8530" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8532", "reference_id": "RHSA-2025:8532", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8532" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8533", "reference_id": "RHSA-2025:8533", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8533" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8534", "reference_id": "RHSA-2025:8534", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8534" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8541", "reference_id": "RHSA-2025:8541", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8541" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8600", "reference_id": "RHSA-2025:8600", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8600" }, { "reference_url": "https://usn.ubuntu.com/7566-1/", "reference_id": "USN-7566-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7566-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-31205" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "8.0", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ksq5-ygcp-nbaz" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72613?format=api", "vulnerability_id": "VCID-kuyh-x3z4-q7gf", "summary": "webkit: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54505", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69106", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69058", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69079", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.6906", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.6911", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69129", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69152", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00587", "scoring_system": "epss", "scoring_elements": "0.69136", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-54505" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121837", "reference_id": "121837", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121837" }, { "reference_url": "https://support.apple.com/en-us/121838", "reference_id": "121838", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121838" }, { "reference_url": "https://support.apple.com/en-us/121839", "reference_id": "121839", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121839" }, { "reference_url": "https://support.apple.com/en-us/121843", "reference_id": "121843", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121843" }, { "reference_url": "https://support.apple.com/en-us/121844", "reference_id": "121844", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121844" }, { "reference_url": "https://support.apple.com/en-us/121845", "reference_id": "121845", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121845" }, { "reference_url": "https://support.apple.com/en-us/121846", "reference_id": "121846", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/" } ], "url": "https://support.apple.com/en-us/121846" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844", "reference_id": "2333844", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0145", "reference_id": "RHSA-2025:0145", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0145" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0146", "reference_id": "RHSA-2025:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0226", "reference_id": "RHSA-2025:0226", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0226" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0276", "reference_id": "RHSA-2025:0276", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0276" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0277", "reference_id": "RHSA-2025:0277", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0277" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0278", "reference_id": "RHSA-2025:0278", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0278" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0279", "reference_id": "RHSA-2025:0279", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0279" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0282", "reference_id": "RHSA-2025:0282", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0282" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:0283", "reference_id": "RHSA-2025:0283", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:0283" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7201-1/", "reference_id": "USN-7201-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7201-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-54505" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kuyh-x3z4-q7gf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67450?format=api", "vulnerability_id": "VCID-kx6w-wbua-5ffr", "summary": "webkitgtk: A website may be able to access sensor information without user consent", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43356", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15335", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15278", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15227", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00049", "scoring_system": "epss", "scoring_elements": "0.15139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00053", "scoring_system": "epss", "scoring_elements": "0.16805", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17611", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17708", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00056", "scoring_system": "epss", "scoring_elements": "0.17662", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43356" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125109", "reference_id": "125109", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125109" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://support.apple.com/en-us/125114", "reference_id": "125114", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125114" }, { "reference_url": "https://support.apple.com/en-us/125115", "reference_id": "125115", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125115" }, { "reference_url": "https://support.apple.com/en-us/125116", "reference_id": "125116", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/" } ], "url": "https://support.apple.com/en-us/125116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397628", "reference_id": "2397628", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397628" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20922", "reference_id": "RHSA-2025:20922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20922" }, { "reference_url": "https://usn.ubuntu.com/7817-1/", "reference_id": "USN-7817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7817-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43356" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-kx6w-wbua-5ffr" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61851?format=api", "vulnerability_id": "VCID-ky87-8zpf-nqg2", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30427", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01119", "scoring_system": "epss", "scoring_elements": "0.78181", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01119", "scoring_system": "epss", "scoring_elements": "0.7823", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01119", "scoring_system": "epss", "scoring_elements": "0.78212", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01119", "scoring_system": "epss", "scoring_elements": "0.78194", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01119", "scoring_system": "epss", "scoring_elements": "0.7822", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01119", "scoring_system": "epss", "scoring_elements": "0.78226", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01119", "scoring_system": "epss", "scoring_elements": "0.78252", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01119", "scoring_system": "epss", "scoring_elements": "0.78234", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-30427" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122371", "reference_id": "122371", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/" } ], "url": "https://support.apple.com/en-us/122371" }, { "reference_url": "https://support.apple.com/en-us/122372", "reference_id": "122372", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/" } ], "url": "https://support.apple.com/en-us/122372" }, { "reference_url": "https://support.apple.com/en-us/122373", "reference_id": "122373", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/" } ], "url": "https://support.apple.com/en-us/122373" }, { "reference_url": "https://support.apple.com/en-us/122377", "reference_id": "122377", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/" } ], "url": "https://support.apple.com/en-us/122377" }, { "reference_url": "https://support.apple.com/en-us/122378", "reference_id": "122378", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/" } ], "url": "https://support.apple.com/en-us/122378" }, { "reference_url": "https://support.apple.com/en-us/122379", "reference_id": "122379", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/" } ], "url": "https://support.apple.com/en-us/122379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919", "reference_id": "2357919", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3713", "reference_id": "RHSA-2025:3713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3755", "reference_id": "RHSA-2025:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3756", "reference_id": "RHSA-2025:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3974", "reference_id": "RHSA-2025:3974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4445", "reference_id": "RHSA-2025:4445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7387", "reference_id": "RHSA-2025:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7998", "reference_id": "RHSA-2025:7998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8064", "reference_id": "RHSA-2025:8064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8065", "reference_id": "RHSA-2025:8065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8066", "reference_id": "RHSA-2025:8066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8194", "reference_id": "RHSA-2025:8194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8194" }, { "reference_url": "https://usn.ubuntu.com/7436-1/", "reference_id": "USN-7436-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7436-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-30427" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ky87-8zpf-nqg2" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66910?format=api", "vulnerability_id": "VCID-m59e-8bgm-77he", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43343", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35109", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35082", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35061", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.35033", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00146", "scoring_system": "epss", "scoring_elements": "0.34988", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37917", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.3798", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37942", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43343" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125110", "reference_id": "125110", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125110" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://support.apple.com/en-us/125114", "reference_id": "125114", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125114" }, { "reference_url": "https://support.apple.com/en-us/125115", "reference_id": "125115", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125115" }, { "reference_url": "https://support.apple.com/en-us/125116", "reference_id": "125116", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/" } ], "url": "https://support.apple.com/en-us/125116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403598", "reference_id": "2403598", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2403598" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18070", "reference_id": "RHSA-2025:18070", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18070" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19913", "reference_id": "RHSA-2025:19913", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19913" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19914", "reference_id": "RHSA-2025:19914", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19914" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19915", "reference_id": "RHSA-2025:19915", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19915" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19916", "reference_id": "RHSA-2025:19916", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19916" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19918", "reference_id": "RHSA-2025:19918", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19918" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19919", "reference_id": "RHSA-2025:19919", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19919" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19920", "reference_id": "RHSA-2025:19920", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19920" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19946", "reference_id": "RHSA-2025:19946", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19946" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20922", "reference_id": "RHSA-2025:20922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20922" }, { "reference_url": "https://usn.ubuntu.com/7895-1/", "reference_id": "USN-7895-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7895-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43343" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-m59e-8bgm-77he" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61838?format=api", "vulnerability_id": "VCID-mch4-qacj-f7ey", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44192", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40741", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40715", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40717", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40667", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40743", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00188", "scoring_system": "epss", "scoring_elements": "0.40723", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43342", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00209", "scoring_system": "epss", "scoring_elements": "0.43358", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44192" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121238", "reference_id": "121238", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/" } ], "url": "https://support.apple.com/en-us/121238" }, { "reference_url": "https://support.apple.com/en-us/121240", "reference_id": "121240", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/" } ], "url": "https://support.apple.com/en-us/121240" }, { "reference_url": "https://support.apple.com/en-us/121241", "reference_id": "121241", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/" } ], "url": "https://support.apple.com/en-us/121241" }, { "reference_url": "https://support.apple.com/en-us/121248", "reference_id": "121248", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/" } ], "url": "https://support.apple.com/en-us/121248" }, { "reference_url": "https://support.apple.com/en-us/121249", "reference_id": "121249", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/" } ], "url": "https://support.apple.com/en-us/121249" }, { "reference_url": "https://support.apple.com/en-us/121250", "reference_id": "121250", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/" } ], "url": "https://support.apple.com/en-us/121250" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871", "reference_id": "2353871", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3713", "reference_id": "RHSA-2025:3713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3755", "reference_id": "RHSA-2025:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3756", "reference_id": "RHSA-2025:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3974", "reference_id": "RHSA-2025:3974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4445", "reference_id": "RHSA-2025:4445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7387", "reference_id": "RHSA-2025:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7998", "reference_id": "RHSA-2025:7998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8064", "reference_id": "RHSA-2025:8064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8065", "reference_id": "RHSA-2025:8065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8066", "reference_id": "RHSA-2025:8066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8194", "reference_id": "RHSA-2025:8194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8194" }, { "reference_url": "https://usn.ubuntu.com/7395-1/", "reference_id": "USN-7395-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7395-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-44192" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mch4-qacj-f7ey" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66449?format=api", "vulnerability_id": "VCID-mfg4-2ma4-3qgj", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43434", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10694", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1063", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10703", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1158", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43434" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416335", "reference_id": "2416335", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416335" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43434" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mfg4-2ma4-3qgj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66447?format=api", "vulnerability_id": "VCID-mhfm-j5xm-wybd", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43431", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12942", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12936", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13015", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13065", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13027", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12988", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00044", "scoring_system": "epss", "scoring_elements": "0.13656", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43431" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416332", "reference_id": "2416332", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416332" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43431" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-mhfm-j5xm-wybd" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61839?format=api", "vulnerability_id": "VCID-n7w5-dz8n-mbht", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44244", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51323", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51277", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51302", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51262", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51317", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51314", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51357", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00279", "scoring_system": "epss", "scoring_elements": "0.51336", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44244" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121563", "reference_id": "121563", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/" } ], "url": "https://support.apple.com/en-us/121563" }, { "reference_url": "https://support.apple.com/en-us/121564", "reference_id": "121564", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/" } ], "url": "https://support.apple.com/en-us/121564" }, { "reference_url": "https://support.apple.com/en-us/121565", "reference_id": "121565", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/" } ], "url": "https://support.apple.com/en-us/121565" }, { "reference_url": "https://support.apple.com/en-us/121566", "reference_id": "121566", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/" } ], "url": "https://support.apple.com/en-us/121566" }, { "reference_url": "https://support.apple.com/en-us/121569", "reference_id": "121569", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/" } ], "url": "https://support.apple.com/en-us/121569" }, { "reference_url": "https://support.apple.com/en-us/121571", "reference_id": "121571", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/" } ], "url": "https://support.apple.com/en-us/121571" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278", "reference_id": "2323278", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9545", "reference_id": "RHSA-2024:9545", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9545" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9553", "reference_id": "RHSA-2024:9553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9637", "reference_id": "RHSA-2024:9637", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9637" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9638", "reference_id": "RHSA-2024:9638", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9638" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9646", "reference_id": "RHSA-2024:9646", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9646" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7113-1/", "reference_id": "USN-7113-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7113-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-44244" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w5-dz8n-mbht" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65880?format=api", "vulnerability_id": "VCID-nmvc-maj7-rfhm", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43536", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18813", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.1863", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18866", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18588", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18667", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18723", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18728", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0006", "scoring_system": "epss", "scoring_elements": "0.18681", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43536" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423190", "reference_id": "2423190", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423190" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43536" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nmvc-maj7-rfhm" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61859?format=api", "vulnerability_id": "VCID-nu9v-3xak-77aw", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43240", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00029", "scoring_system": "epss", "scoring_elements": "0.08273", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09114", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0913", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.0905", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09161", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00032", "scoring_system": "epss", "scoring_elements": "0.09128", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43240" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384385", "reference_id": "2384385", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2384385" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43240" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-nu9v-3xak-77aw" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61858?format=api", "vulnerability_id": "VCID-p84d-5ze6-9fb5", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43228", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1092", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12046", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.11971", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12053", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12105", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12112", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12075", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.1217", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43228" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386275", "reference_id": "2386275", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386275" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43228" ], "risk_score": 1.9, "exploitability": "0.5", "weighted_severity": "3.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-p84d-5ze6-9fb5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66045?format=api", "vulnerability_id": "VCID-ph63-r178-pfgg", "summary": "webkitgtk: webkitgtk: Use-after-free due to improper memory management", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43529", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31831", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31787", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31731", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.31702", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00125", "scoring_system": "epss", "scoring_elements": "0.3165", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35872", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35936", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00152", "scoring_system": "epss", "scoring_elements": "0.35896", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43529" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125889", "reference_id": "125889", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125889" }, { "reference_url": "https://support.apple.com/en-us/125890", "reference_id": "125890", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125890" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423166", "reference_id": "2423166", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423166" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43529" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-ph63-r178-pfgg" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66450?format=api", "vulnerability_id": "VCID-pwqw-z8jj-abfs", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43440", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12099", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12226", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12027", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12109", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12161", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0004", "scoring_system": "epss", "scoring_elements": "0.12131", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00042", "scoring_system": "epss", "scoring_elements": "0.13044", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43440" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416336", "reference_id": "2416336", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416336" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43440" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pwqw-z8jj-abfs" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61835?format=api", "vulnerability_id": "VCID-pyek-9fpp-nudy", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40866", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25506", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25472", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25546", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25594", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25604", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25563", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25663", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0009", "scoring_system": "epss", "scoring_elements": "0.25704", "published_at": "2026-04-04T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-40866" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121238", "reference_id": "121238", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/" } ], "url": "https://support.apple.com/en-us/121238" }, { "reference_url": "https://support.apple.com/en-us/121241", "reference_id": "121241", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/" } ], "url": "https://support.apple.com/en-us/121241" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724", "reference_id": "2312724", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8180", "reference_id": "RHSA-2024:8180", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8180" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9553", "reference_id": "RHSA-2024:9553", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9553" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9636", "reference_id": "RHSA-2024:9636", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9636" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7079-1/", "reference_id": "USN-7079-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7079-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-40866" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-pyek-9fpp-nudy" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66448?format=api", "vulnerability_id": "VCID-qytm-81jk-muhc", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43432", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10285", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10283", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10179", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10253", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10315", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10345", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00035", "scoring_system": "epss", "scoring_elements": "0.10304", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10752", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43432" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416334", "reference_id": "2416334", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416334" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43432" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qytm-81jk-muhc" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61857?format=api", "vulnerability_id": "VCID-r857-ke39-xug8", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43227", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00132", "scoring_system": "epss", "scoring_elements": "0.32854", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34644", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34755", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34632", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34676", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34704", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34707", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00143", "scoring_system": "epss", "scoring_elements": "0.34668", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43227" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386274", "reference_id": "2386274", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386274" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43227" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-r857-ke39-xug8" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61850?format=api", "vulnerability_id": "VCID-rj9q-8rw3-qbbn", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24264", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01384", "scoring_system": "epss", "scoring_elements": "0.80265", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01384", "scoring_system": "epss", "scoring_elements": "0.8031", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01384", "scoring_system": "epss", "scoring_elements": "0.80286", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01384", "scoring_system": "epss", "scoring_elements": "0.80274", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01384", "scoring_system": "epss", "scoring_elements": "0.80302", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01384", "scoring_system": "epss", "scoring_elements": "0.80313", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01384", "scoring_system": "epss", "scoring_elements": "0.80331", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01384", "scoring_system": "epss", "scoring_elements": "0.80316", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24264" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122371", "reference_id": "122371", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/" } ], "url": "https://support.apple.com/en-us/122371" }, { "reference_url": "https://support.apple.com/en-us/122372", "reference_id": "122372", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/" } ], "url": "https://support.apple.com/en-us/122372" }, { "reference_url": "https://support.apple.com/en-us/122373", "reference_id": "122373", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/" } ], "url": "https://support.apple.com/en-us/122373" }, { "reference_url": "https://support.apple.com/en-us/122377", "reference_id": "122377", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/" } ], "url": "https://support.apple.com/en-us/122377" }, { "reference_url": "https://support.apple.com/en-us/122378", "reference_id": "122378", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/" } ], "url": "https://support.apple.com/en-us/122378" }, { "reference_url": "https://support.apple.com/en-us/122379", "reference_id": "122379", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/" } ], "url": "https://support.apple.com/en-us/122379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918", "reference_id": "2357918", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4201", "reference_id": "RHSA-2023:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4202", "reference_id": "RHSA-2023:4202", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:8496", "reference_id": "RHSA-2024:8496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9653", "reference_id": "RHSA-2024:9653", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9679", "reference_id": "RHSA-2024:9679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:9680", "reference_id": "RHSA-2024:9680", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7436-1/", "reference_id": "USN-7436-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7436-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24264" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9q-8rw3-qbbn" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66368?format=api", "vulnerability_id": "VCID-stjs-xknd-zfgh", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66287", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21677", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0007", "scoring_system": "epss", "scoring_elements": "0.21619", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27617", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27604", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27671", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27714", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27719", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.001", "scoring_system": "epss", "scoring_elements": "0.27675", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-66287" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418857", "reference_id": "2418857", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2418857" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7", "reference_id": "cpe:/o:redhat:rhel_els:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-66287", "reference_id": "CVE-2025-66287", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-66287" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7941-1/", "reference_id": "USN-7941-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7941-1/" }, { "reference_url": "https://webkitgtk.org/security/WSA-2025-0009.html", "reference_id": "WSA-2025-0009.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/" } ], "url": "https://webkitgtk.org/security/WSA-2025-0009.html" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-66287" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-stjs-xknd-zfgh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/72701?format=api", "vulnerability_id": "VCID-tqb3-nabh-tkeh", "summary": "webkitgtk: data isolation bypass vulnerability", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44309", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01158", "scoring_system": "epss", "scoring_elements": "0.78526", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01274", "scoring_system": "epss", "scoring_elements": "0.79532", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01274", "scoring_system": "epss", "scoring_elements": "0.79513", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01274", "scoring_system": "epss", "scoring_elements": "0.79499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01274", "scoring_system": "epss", "scoring_elements": "0.79527", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01274", "scoring_system": "epss", "scoring_elements": "0.79535", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01274", "scoring_system": "epss", "scoring_elements": "0.79557", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01274", "scoring_system": "epss", "scoring_elements": "0.7954", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2024-44309" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/121752", "reference_id": "121752", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/" } ], "url": "https://support.apple.com/en-us/121752" }, { "reference_url": "https://support.apple.com/en-us/121753", "reference_id": "121753", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/" } ], "url": "https://support.apple.com/en-us/121753" }, { "reference_url": "https://support.apple.com/en-us/121754", "reference_id": "121754", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/" } ], "url": "https://support.apple.com/en-us/121754" }, { "reference_url": "https://support.apple.com/en-us/121755", "reference_id": "121755", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/" } ], "url": "https://support.apple.com/en-us/121755" }, { "reference_url": "https://support.apple.com/en-us/121756", "reference_id": "121756", "reference_type": "", "scores": [ { "value": "6.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/" } ], "url": "https://support.apple.com/en-us/121756" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927", "reference_id": "2327927", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10472", "reference_id": "RHSA-2024:10472", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10472" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10480", "reference_id": "RHSA-2024:10480", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10480" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10481", "reference_id": "RHSA-2024:10481", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10481" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10482", "reference_id": "RHSA-2024:10482", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10482" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10483", "reference_id": "RHSA-2024:10483", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10483" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10489", "reference_id": "RHSA-2024:10489", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10489" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10492", "reference_id": "RHSA-2024:10492", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10492" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10496", "reference_id": "RHSA-2024:10496", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10496" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2024:10501", "reference_id": "RHSA-2024:10501", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2024:10501" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://usn.ubuntu.com/7142-1/", "reference_id": "USN-7142-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7142-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2024-44309" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "5.5", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-tqb3-nabh-tkeh" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66444?format=api", "vulnerability_id": "VCID-u6k6-1hmc-tfaf", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43427", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19484", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19732", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19456", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19535", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19587", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.1959", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00063", "scoring_system": "epss", "scoring_elements": "0.19542", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00065", "scoring_system": "epss", "scoring_elements": "0.20366", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43427" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416329", "reference_id": "2416329", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416329" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43427" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u6k6-1hmc-tfaf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61845?format=api", "vulnerability_id": "VCID-u9g4-5f16-yqc9", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24209", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.02557", "scoring_system": "epss", "scoring_elements": "0.85507", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.02557", "scoring_system": "epss", "scoring_elements": "0.85465", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.02557", "scoring_system": "epss", "scoring_elements": "0.85468", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.02557", "scoring_system": "epss", "scoring_elements": "0.85489", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.02557", "scoring_system": "epss", "scoring_elements": "0.85497", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.02557", "scoring_system": "epss", "scoring_elements": "0.85512", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.02557", "scoring_system": "epss", "scoring_elements": "0.8551", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.03379", "scoring_system": "epss", "scoring_elements": "0.87339", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24209" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122371", "reference_id": "122371", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/" } ], "url": "https://support.apple.com/en-us/122371" }, { "reference_url": "https://support.apple.com/en-us/122372", "reference_id": "122372", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/" } ], "url": "https://support.apple.com/en-us/122372" }, { "reference_url": "https://support.apple.com/en-us/122373", "reference_id": "122373", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/" } ], "url": "https://support.apple.com/en-us/122373" }, { "reference_url": "https://support.apple.com/en-us/122376", "reference_id": "122376", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/" } ], "url": "https://support.apple.com/en-us/122376" }, { "reference_url": "https://support.apple.com/en-us/122377", "reference_id": "122377", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/" } ], "url": "https://support.apple.com/en-us/122377" }, { "reference_url": "https://support.apple.com/en-us/122379", "reference_id": "122379", "reference_type": "", "scores": [ { "value": "7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/" } ], "url": "https://support.apple.com/en-us/122379" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911", "reference_id": "2357911", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3713", "reference_id": "RHSA-2025:3713", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3713" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3755", "reference_id": "RHSA-2025:3755", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3755" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3756", "reference_id": "RHSA-2025:3756", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3756" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:3974", "reference_id": "RHSA-2025:3974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:3974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:4445", "reference_id": "RHSA-2025:4445", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:4445" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7387", "reference_id": "RHSA-2025:7387", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7387" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:7998", "reference_id": "RHSA-2025:7998", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:7998" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8064", "reference_id": "RHSA-2025:8064", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8064" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8065", "reference_id": "RHSA-2025:8065", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8065" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8066", "reference_id": "RHSA-2025:8066", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8066" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:8194", "reference_id": "RHSA-2025:8194", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:8194" }, { "reference_url": "https://usn.ubuntu.com/7436-1/", "reference_id": "USN-7436-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7436-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24209" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-u9g4-5f16-yqc9" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64208?format=api", "vulnerability_id": "VCID-unu1-sbnm-27bf", "summary": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43433", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12942", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13133", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12936", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13015", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13065", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.13027", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00043", "scoring_system": "epss", "scoring_elements": "0.12988", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00045", "scoring_system": "epss", "scoring_elements": "0.14014", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43433" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448783", "reference_id": "2448783", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448783" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43433" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-unu1-sbnm-27bf" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/68659?format=api", "vulnerability_id": "VCID-vk4e-qufz-5ffp", "summary": "angle: insufficient input validation can cause undefined behavior", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6558", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37959", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37993", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38004", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.38021", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00168", "scoring_system": "epss", "scoring_elements": "0.37984", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44447", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44381", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00218", "scoring_system": "epss", "scoring_elements": "0.44426", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-6558" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.7", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380254", "reference_id": "2380254", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380254" }, { "reference_url": "https://issues.chromium.org/issues/427162086", "reference_id": "427162086", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/" } ], "url": "https://issues.chromium.org/issues/427162086" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html", "reference_id": "stable-channel-update-for-desktop_15.html", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Attend", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/" } ], "url": "https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-6558" ], "risk_score": 10.0, "exploitability": "2.0", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-vk4e-qufz-5ffp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66441?format=api", "vulnerability_id": "VCID-w3r3-11kt-2ydu", "summary": "webkitgtk: A website may exfiltrate image data cross-origin", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43392", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08627", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08649", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08567", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.0864", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08664", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08662", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0003", "scoring_system": "epss", "scoring_elements": "0.08639", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00031", "scoring_system": "epss", "scoring_elements": "0.08987", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43392" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125639", "reference_id": "125639", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125639" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416325", "reference_id": "2416325", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416325" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" }, { "reference_url": "https://usn.ubuntu.com/7914-1/", "reference_id": "USN-7914-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7914-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43392" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-w3r3-11kt-2ydu" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/71952?format=api", "vulnerability_id": "VCID-wbn4-ea3w-k7f3", "summary": "webkitgtk: Processing web content may lead to a denial-of-service", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24158", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.74985", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75025", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75014", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.7499", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75024", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75036", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.0086", "scoring_system": "epss", "scoring_elements": "0.75057", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-24158" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/122066", "reference_id": "122066", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/" } ], "url": "https://support.apple.com/en-us/122066" }, { "reference_url": "https://support.apple.com/en-us/122068", "reference_id": "122068", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/" } ], "url": "https://support.apple.com/en-us/122068" }, { "reference_url": "https://support.apple.com/en-us/122071", "reference_id": "122071", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/" } ], "url": "https://support.apple.com/en-us/122071" }, { "reference_url": "https://support.apple.com/en-us/122072", "reference_id": "122072", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/" } ], "url": "https://support.apple.com/en-us/122072" }, { "reference_url": "https://support.apple.com/en-us/122073", "reference_id": "122073", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/" } ], "url": "https://support.apple.com/en-us/122073" }, { "reference_url": "https://support.apple.com/en-us/122074", "reference_id": "122074", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/" } ], "url": "https://support.apple.com/en-us/122074" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623", "reference_id": "2344623", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2023:4201", "reference_id": "RHSA-2023:4201", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:10364", "reference_id": "RHSA-2025:10364", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:2034", "reference_id": "RHSA-2025:2034", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:2034" }, { "reference_url": "https://usn.ubuntu.com/7279-1/", "reference_id": "USN-7279-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7279-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-24158" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wbn4-ea3w-k7f3" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/67449?format=api", "vulnerability_id": "VCID-whma-xbxr-5uay", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43342", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52355", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52326", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52366", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.5237", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00289", "scoring_system": "epss", "scoring_elements": "0.52317", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00332", "scoring_system": "epss", "scoring_elements": "0.56087", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00332", "scoring_system": "epss", "scoring_elements": "0.56127", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00332", "scoring_system": "epss", "scoring_elements": "0.56104", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43342" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.6", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125108", "reference_id": "125108", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125108" }, { "reference_url": "https://support.apple.com/en-us/125109", "reference_id": "125109", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125109" }, { "reference_url": "https://support.apple.com/en-us/125110", "reference_id": "125110", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125110" }, { "reference_url": "https://support.apple.com/en-us/125113", "reference_id": "125113", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125113" }, { "reference_url": "https://support.apple.com/en-us/125114", "reference_id": "125114", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125114" }, { "reference_url": "https://support.apple.com/en-us/125115", "reference_id": "125115", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125115" }, { "reference_url": "https://support.apple.com/en-us/125116", "reference_id": "125116", "reference_type": "", "scores": [ { "value": "9.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/" } ], "url": "https://support.apple.com/en-us/125116" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397627", "reference_id": "2397627", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2397627" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17643", "reference_id": "RHSA-2025:17643", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17643" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17741", "reference_id": "RHSA-2025:17741", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17741" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17743", "reference_id": "RHSA-2025:17743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17743" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17802", "reference_id": "RHSA-2025:17802", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17802" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:17807", "reference_id": "RHSA-2025:17807", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:17807" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:18097", "reference_id": "RHSA-2025:18097", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:18097" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19109", "reference_id": "RHSA-2025:19109", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19109" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19157", "reference_id": "RHSA-2025:19157", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19157" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19165", "reference_id": "RHSA-2025:19165", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19165" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:19352", "reference_id": "RHSA-2025:19352", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:19352" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:20922", "reference_id": "RHSA-2025:20922", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:20922" }, { "reference_url": "https://usn.ubuntu.com/7817-1/", "reference_id": "USN-7817-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7817-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43342" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-whma-xbxr-5uay" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61854?format=api", "vulnerability_id": "VCID-wnxh-854z-ykfk", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43211", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.05046", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04925", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.0491", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04929", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04965", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04981", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04963", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00019", "scoring_system": "epss", "scoring_elements": "0.04943", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43211" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124148", "reference_id": "124148", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124148" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "6.2", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386270", "reference_id": "2386270", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386270" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43211" ], "risk_score": 3.0, "exploitability": "0.5", "weighted_severity": "5.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxh-854z-ykfk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/64210?format=api", "vulnerability_id": "VCID-xpp8-357g-c7gp", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43441", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10647", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10694", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10558", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.1063", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10689", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10703", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00036", "scoring_system": "epss", "scoring_elements": "0.10671", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1158", "published_at": "2026-04-02T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43441" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125632", "reference_id": "125632", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125632" }, { "reference_url": "https://support.apple.com/en-us/125633", "reference_id": "125633", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125633" }, { "reference_url": "https://support.apple.com/en-us/125634", "reference_id": "125634", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125634" }, { "reference_url": "https://support.apple.com/en-us/125637", "reference_id": "125637", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125637" }, { "reference_url": "https://support.apple.com/en-us/125638", "reference_id": "125638", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125638" }, { "reference_url": "https://support.apple.com/en-us/125640", "reference_id": "125640", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/" } ], "url": "https://support.apple.com/en-us/125640" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448785", "reference_id": "2448785", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2448785" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23743" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43441" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xpp8-357g-c7gp" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/66431?format=api", "vulnerability_id": "VCID-xr5y-1ebg-xqcj", "summary": "webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13502", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29379", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29472", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29475", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29498", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29546", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29367", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.0011", "scoring_system": "epss", "scoring_elements": "0.29431", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-13502" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416300", "reference_id": "2416300", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2416300" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream", "reference_id": "cpe:/a:redhat:enterprise_linux:9::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_aus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.0::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_id": "cpe:/a:redhat:rhel_e4s:9.2::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_id": "cpe:/a:redhat:rhel_eus:9.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_id": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.6::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_id": "cpe:/a:redhat:rhel_tus:8.8::appstream", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6", "reference_id": "cpe:/o:redhat:enterprise_linux:6", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7", "reference_id": "cpe:/o:redhat:enterprise_linux:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7", "reference_id": "cpe:/o:redhat:rhel_els:7", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2025-13502", "reference_id": "CVE-2025-13502", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/security/cve/CVE-2025-13502" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22789", "reference_id": "RHSA-2025:22789", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22789" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:22790", "reference_id": "RHSA-2025:22790", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:22790" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23110", "reference_id": "RHSA-2025:23110", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23110" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23433", "reference_id": "RHSA-2025:23433", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23434", "reference_id": "RHSA-2025:23434", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23451", "reference_id": "RHSA-2025:23451", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23451" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23452", "reference_id": "RHSA-2025:23452", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23452" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23583", "reference_id": "RHSA-2025:23583", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23583" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23591", "reference_id": "RHSA-2025:23591", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23591" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23742", "reference_id": "RHSA-2025:23742", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23742" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23743", "reference_id": "RHSA-2025:23743", "reference_type": "", "scores": [ { "value": "7.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/" } ], "url": "https://access.redhat.com/errata/RHSA-2025:23743" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-13502" ], "risk_score": 3.4, "exploitability": "0.5", "weighted_severity": "6.8", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-xr5y-1ebg-xqcj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/61853?format=api", "vulnerability_id": "VCID-yg6b-hsst-ckaa", "summary": "Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31278", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00096", "scoring_system": "epss", "scoring_elements": "0.2663", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28519", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28699", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28505", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28569", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.2861", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28612", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00105", "scoring_system": "epss", "scoring_elements": "0.28568", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-31278" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/124147", "reference_id": "124147", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124147" }, { "reference_url": "https://support.apple.com/en-us/124148", "reference_id": "124148", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124148" }, { "reference_url": "https://support.apple.com/en-us/124149", "reference_id": "124149", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124149" }, { "reference_url": "https://support.apple.com/en-us/124152", "reference_id": "124152", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124152" }, { "reference_url": "https://support.apple.com/en-us/124153", "reference_id": "124153", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124153" }, { "reference_url": "https://support.apple.com/en-us/124154", "reference_id": "124154", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124154" }, { "reference_url": "https://support.apple.com/en-us/124155", "reference_id": "124155", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/" } ], "url": "https://support.apple.com/en-us/124155" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386269", "reference_id": "2386269", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2386269" }, { "reference_url": "https://security.gentoo.org/glsa/202511-02", "reference_id": "GLSA-202511-02", "reference_type": "", "scores": [], "url": "https://security.gentoo.org/glsa/202511-02" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13780", "reference_id": "RHSA-2025:13780", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13780" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:13782", "reference_id": "RHSA-2025:13782", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:13782" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14421", "reference_id": "RHSA-2025:14421", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14422", "reference_id": "RHSA-2025:14422", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14422" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14423", "reference_id": "RHSA-2025:14423", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14423" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14432", "reference_id": "RHSA-2025:14432", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14432" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14433", "reference_id": "RHSA-2025:14433", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14433" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14434", "reference_id": "RHSA-2025:14434", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14434" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:14486", "reference_id": "RHSA-2025:14486", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:14486" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:15729", "reference_id": "RHSA-2025:15729", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:15729" }, { "reference_url": "https://usn.ubuntu.com/7702-1/", "reference_id": "USN-7702-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7702-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-31278" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6b-hsst-ckaa" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/65879?format=api", "vulnerability_id": "VCID-z7hw-fywx-dffc", "summary": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "8.8", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43535", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11546", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11478", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11601", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.1139", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11473", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11532", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11542", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00038", "scoring_system": "epss", "scoring_elements": "0.11508", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2025-43535" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535" }, { "reference_url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.5", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" } ], "url": "https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml" }, { "reference_url": "https://support.apple.com/en-us/125884", "reference_id": "125884", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125884" }, { "reference_url": "https://support.apple.com/en-us/125885", "reference_id": "125885", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125885" }, { "reference_url": "https://support.apple.com/en-us/125886", "reference_id": "125886", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125886" }, { "reference_url": "https://support.apple.com/en-us/125891", "reference_id": "125891", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125891" }, { "reference_url": "https://support.apple.com/en-us/125892", "reference_id": "125892", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" }, { "value": "Track", "scoring_system": "ssvc", "scoring_elements": "SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/" } ], "url": "https://support.apple.com/en-us/125892" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423188", "reference_id": "2423188", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423188" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23663", "reference_id": "RHSA-2025:23663", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23663" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23700", "reference_id": "RHSA-2025:23700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23967", "reference_id": "RHSA-2025:23967", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23967" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23968", "reference_id": "RHSA-2025:23968", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23968" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23969", "reference_id": "RHSA-2025:23969", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23969" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23970", "reference_id": "RHSA-2025:23970", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23970" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23971", "reference_id": "RHSA-2025:23971", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23971" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23972", "reference_id": "RHSA-2025:23972", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23972" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23973", "reference_id": "RHSA-2025:23973", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23973" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23974", "reference_id": "RHSA-2025:23974", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23974" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2025:23975", "reference_id": "RHSA-2025:23975", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2025:23975" }, { "reference_url": "https://usn.ubuntu.com/7957-1/", "reference_id": "USN-7957-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7957-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/995085?format=api", "purl": "pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-25ng-4kwb-qfat" }, { "vulnerability": "VCID-4k57-k2s6-wkhx" }, { "vulnerability": "VCID-7ut5-fu6w-63fs" }, { "vulnerability": "VCID-88kv-qter-5fc3" }, { "vulnerability": "VCID-8cxd-4p9j-dyf1" }, { "vulnerability": "VCID-988h-sqnj-57fg" }, { "vulnerability": "VCID-eu4s-vvyf-pqh3" }, { "vulnerability": "VCID-ffha-wafn-sqa9" }, { "vulnerability": "VCID-fpvs-seby-kfhv" }, { "vulnerability": "VCID-gqm2-5nh3-7ufp" }, { "vulnerability": "VCID-mmcp-4qnx-5ufh" }, { "vulnerability": "VCID-nwkr-s7vs-p7fz" }, { "vulnerability": "VCID-t46t-rhgu-cbc1" }, { "vulnerability": "VCID-teue-y6qz-jyfw" }, { "vulnerability": "VCID-w5gq-k53s-tuc5" }, { "vulnerability": "VCID-wrt4-z8ne-zffm" }, { "vulnerability": "VCID-x5sh-5xtn-r7cp" }, { "vulnerability": "VCID-yfww-r9rn-73dy" }, { "vulnerability": "VCID-zk2j-9hd2-hfcn" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" } ], "aliases": [ "CVE-2025-43535" ], "risk_score": 4.0, "exploitability": "0.5", "weighted_severity": "7.9", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-z7hw-fywx-dffc" } ], "risk_score": "4.0", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1" }