Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/webkit2gtk@2.42.2-1~deb12u1
Typedeb
Namespacedebian
Namewebkit2gtk
Version2.42.2-1~deb12u1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version2.50.6-1~deb12u1
Latest_non_vulnerable_version2.52.1-1
Affected_by_vulnerabilities
0
url VCID-1164-uckc-qfbs
vulnerability_id VCID-1164-uckc-qfbs
summary webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40789
reference_id
reference_type
scores
0
value 0.00696
scoring_system epss
scoring_elements 0.71921
published_at 2026-04-13T12:55:00Z
1
value 0.00754
scoring_system epss
scoring_elements 0.73176
published_at 2026-04-02T12:55:00Z
2
value 0.00756
scoring_system epss
scoring_elements 0.73263
published_at 2026-04-09T12:55:00Z
3
value 0.00756
scoring_system epss
scoring_elements 0.73214
published_at 2026-04-07T12:55:00Z
4
value 0.00756
scoring_system epss
scoring_elements 0.73241
published_at 2026-04-04T12:55:00Z
5
value 0.00756
scoring_system epss
scoring_elements 0.7325
published_at 2026-04-08T12:55:00Z
6
value 0.00756
scoring_system epss
scoring_elements 0.73269
published_at 2026-04-12T12:55:00Z
7
value 0.00756
scoring_system epss
scoring_elements 0.73289
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2302067
reference_id 2302067
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2302067
19
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214116
20
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214117
21
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214119
22
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214121
23
reference_url https://support.apple.com/kb/HT214121
reference_id HT214121
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/kb/HT214121
24
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214122
25
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214123
26
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214124
27
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
31
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
32
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
33
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
34
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
35
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
36
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-40789
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1164-uckc-qfbs
1
url VCID-1e6d-p4fv-rubk
vulnerability_id VCID-1e6d-p4fv-rubk
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27808
reference_id
reference_type
scores
0
value 0.00822
scoring_system epss
scoring_elements 0.7442
published_at 2026-04-13T12:55:00Z
1
value 0.00822
scoring_system epss
scoring_elements 0.74404
published_at 2026-04-04T12:55:00Z
2
value 0.00822
scoring_system epss
scoring_elements 0.74379
published_at 2026-04-07T12:55:00Z
3
value 0.00822
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-08T12:55:00Z
4
value 0.00822
scoring_system epss
scoring_elements 0.74427
published_at 2026-04-09T12:55:00Z
5
value 0.00822
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-11T12:55:00Z
6
value 0.00822
scoring_system epss
scoring_elements 0.74429
published_at 2026-04-12T12:55:00Z
7
value 0.01092
scoring_system epss
scoring_elements 0.77899
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120901
9
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120902
10
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120903
11
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120905
12
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120906
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314697
reference_id 2314697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314697
14
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
15
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214101
16
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214102
17
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214103
18
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214104
19
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214106
20
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214108
21
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
22
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
23
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
24
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
25
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
26
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
27
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
28
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-27808
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6d-p4fv-rubk
2
url VCID-1vsk-e1mf-6uaz
vulnerability_id VCID-1vsk-e1mf-6uaz
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43216
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28385
published_at 2026-04-02T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29857
published_at 2026-04-13T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.30035
published_at 2026-04-04T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29849
published_at 2026-04-07T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.29912
published_at 2026-04-08T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29948
published_at 2026-04-09T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29953
published_at 2026-04-11T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29906
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386273
reference_id 2386273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386273
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43216
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vsk-e1mf-6uaz
3
url VCID-1xcs-fpk3-nyg4
vulnerability_id VCID-1xcs-fpk3-nyg4
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44187
reference_id
reference_type
scores
0
value 0.00539
scoring_system epss
scoring_elements 0.67584
published_at 2026-04-13T12:55:00Z
1
value 0.00539
scoring_system epss
scoring_elements 0.67543
published_at 2026-04-02T12:55:00Z
2
value 0.00539
scoring_system epss
scoring_elements 0.67564
published_at 2026-04-04T12:55:00Z
3
value 0.00539
scoring_system epss
scoring_elements 0.67542
published_at 2026-04-07T12:55:00Z
4
value 0.00539
scoring_system epss
scoring_elements 0.67594
published_at 2026-04-08T12:55:00Z
5
value 0.00539
scoring_system epss
scoring_elements 0.67607
published_at 2026-04-09T12:55:00Z
6
value 0.00539
scoring_system epss
scoring_elements 0.6763
published_at 2026-04-11T12:55:00Z
7
value 0.00539
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314706
reference_id 2314706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314706
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/7079-1/
reference_id USN-7079-1
reference_type
scores
url https://usn.ubuntu.com/7079-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44187
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xcs-fpk3-nyg4
4
url VCID-23pb-y6g6-sbed
vulnerability_id VCID-23pb-y6g6-sbed
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24189.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24189
reference_id
reference_type
scores
0
value 0.00912
scoring_system epss
scoring_elements 0.75799
published_at 2026-04-02T12:55:00Z
1
value 0.00912
scoring_system epss
scoring_elements 0.75852
published_at 2026-04-13T12:55:00Z
2
value 0.00912
scoring_system epss
scoring_elements 0.75831
published_at 2026-04-04T12:55:00Z
3
value 0.00912
scoring_system epss
scoring_elements 0.75809
published_at 2026-04-07T12:55:00Z
4
value 0.00912
scoring_system epss
scoring_elements 0.75842
published_at 2026-04-08T12:55:00Z
5
value 0.00912
scoring_system epss
scoring_elements 0.75854
published_at 2026-04-09T12:55:00Z
6
value 0.00912
scoring_system epss
scoring_elements 0.75877
published_at 2026-04-11T12:55:00Z
7
value 0.00912
scoring_system epss
scoring_elements 0.75859
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24189
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24189
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122071
reference_id 122071
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122071
7
reference_url https://support.apple.com/en-us/122072
reference_id 122072
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122072
8
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122073
9
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-19T16:41:55Z/
url https://support.apple.com/en-us/122074
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386267
reference_id 2386267
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386267
11
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
12
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
13
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
14
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
15
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
16
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
17
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
18
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
19
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24189
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-23pb-y6g6-sbed
5
url VCID-25ng-4kwb-qfat
vulnerability_id VCID-25ng-4kwb-qfat
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20636
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12694
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12561
published_at 2026-04-13T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12738
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12549
published_at 2026-04-07T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.12628
published_at 2026-04-08T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.1268
published_at 2026-04-09T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12648
published_at 2026-04-11T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12606
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126348
6
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126353
7
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126354
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448791
reference_id 2448791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448791
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
1
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20636
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-25ng-4kwb-qfat
6
url VCID-2hr6-uu49-1qb7
vulnerability_id VCID-2hr6-uu49-1qb7
summary webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13947
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17412
published_at 2026-04-02T12:55:00Z
1
value 0.00074
scoring_system epss
scoring_elements 0.22368
published_at 2026-04-13T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22443
published_at 2026-04-09T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22464
published_at 2026-04-11T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22423
published_at 2026-04-12T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22519
published_at 2026-04-04T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22307
published_at 2026-04-07T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22388
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13947
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418576
reference_id 2418576
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2418576
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
22
reference_url https://access.redhat.com/security/cve/CVE-2025-13947
reference_id CVE-2025-13947
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/security/cve/CVE-2025-13947
23
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:22789
24
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:22790
25
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23110
26
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23433
27
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23434
28
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23451
29
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23452
30
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23583
31
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23591
32
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23742
33
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23743
34
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-13947
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hr6-uu49-1qb7
7
url VCID-2nmg-6jk2-ebcb
vulnerability_id VCID-2nmg-6jk2-ebcb
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44296
reference_id
reference_type
scores
0
value 0.00664
scoring_system epss
scoring_elements 0.71183
published_at 2026-04-13T12:55:00Z
1
value 0.00664
scoring_system epss
scoring_elements 0.71143
published_at 2026-04-02T12:55:00Z
2
value 0.00664
scoring_system epss
scoring_elements 0.71161
published_at 2026-04-04T12:55:00Z
3
value 0.00664
scoring_system epss
scoring_elements 0.71136
published_at 2026-04-07T12:55:00Z
4
value 0.00664
scoring_system epss
scoring_elements 0.71178
published_at 2026-04-08T12:55:00Z
5
value 0.00664
scoring_system epss
scoring_elements 0.71191
published_at 2026-04-09T12:55:00Z
6
value 0.00664
scoring_system epss
scoring_elements 0.71214
published_at 2026-04-11T12:55:00Z
7
value 0.00664
scoring_system epss
scoring_elements 0.712
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44296
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121563
reference_id 121563
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121563
5
reference_url https://support.apple.com/en-us/121564
reference_id 121564
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121564
6
reference_url https://support.apple.com/en-us/121565
reference_id 121565
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121565
7
reference_url https://support.apple.com/en-us/121566
reference_id 121566
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121566
8
reference_url https://support.apple.com/en-us/121567
reference_id 121567
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121567
9
reference_url https://support.apple.com/en-us/121569
reference_id 121569
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121569
10
reference_url https://support.apple.com/en-us/121571
reference_id 121571
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121571
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323289
reference_id 2323289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323289
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2024:9545
reference_id RHSA-2024:9545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9545
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/7113-1/
reference_id USN-7113-1
reference_type
scores
url https://usn.ubuntu.com/7113-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44296
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2nmg-6jk2-ebcb
8
url VCID-2pgr-9muu-s3ge
vulnerability_id VCID-2pgr-9muu-s3ge
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43443
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.14982
published_at 2026-04-13T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15169
published_at 2026-04-04T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.14973
published_at 2026-04-07T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15061
published_at 2026-04-08T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15114
published_at 2026-04-09T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15081
published_at 2026-04-11T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15043
published_at 2026-04-12T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16305
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43443
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416337
reference_id 2416337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416337
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43443
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgr-9muu-s3ge
9
url VCID-2rm2-f5xj-1bb2
vulnerability_id VCID-2rm2-f5xj-1bb2
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24208
reference_id
reference_type
scores
0
value 0.00315
scoring_system epss
scoring_elements 0.54584
published_at 2026-04-02T12:55:00Z
1
value 0.00315
scoring_system epss
scoring_elements 0.54598
published_at 2026-04-13T12:55:00Z
2
value 0.00315
scoring_system epss
scoring_elements 0.54577
published_at 2026-04-07T12:55:00Z
3
value 0.00315
scoring_system epss
scoring_elements 0.54629
published_at 2026-04-08T12:55:00Z
4
value 0.00315
scoring_system epss
scoring_elements 0.54623
published_at 2026-04-09T12:55:00Z
5
value 0.00315
scoring_system epss
scoring_elements 0.54636
published_at 2026-04-11T12:55:00Z
6
value 0.00315
scoring_system epss
scoring_elements 0.54619
published_at 2026-04-12T12:55:00Z
7
value 0.00315
scoring_system epss
scoring_elements 0.54608
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/
url https://support.apple.com/en-us/122379
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357910
reference_id 2357910
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357910
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
10
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
11
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
12
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
13
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
14
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
15
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
16
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
17
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
18
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
19
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24208
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2rm2-f5xj-1bb2
10
url VCID-2vtf-gudd-9fah
vulnerability_id VCID-2vtf-gudd-9fah
summary WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54479
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71986
published_at 2026-04-13T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-02T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71966
published_at 2026-04-04T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71943
published_at 2026-04-07T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71982
published_at 2026-04-08T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71994
published_at 2026-04-09T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72018
published_at 2026-04-11T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72001
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121838
reference_id 121838
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121838
6
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121839
7
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121843
8
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121844
9
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121845
10
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121846
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333841
reference_id 2333841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333841
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54479
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vtf-gudd-9fah
11
url VCID-3daw-8nh6-dfcq
vulnerability_id VCID-3daw-8nh6-dfcq
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44185
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.1148
published_at 2026-04-13T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11549
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11603
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11392
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11476
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11535
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11545
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11511
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120909
5
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120911
6
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120913
7
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120914
8
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120915
9
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120916
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323263
reference_id 2323263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323263
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2024:9637
reference_id RHSA-2024:9637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9637
16
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44185
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3daw-8nh6-dfcq
12
url VCID-3frv-ppjt-9bdy
vulnerability_id VCID-3frv-ppjt-9bdy
summary webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24143
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32688
published_at 2026-04-02T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32555
published_at 2026-04-13T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32723
published_at 2026-04-04T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32544
published_at 2026-04-07T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32592
published_at 2026-04-08T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32618
published_at 2026-04-09T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.3262
published_at 2026-04-11T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32581
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24143
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122073
7
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122074
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344621
reference_id 2344621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344621
9
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
10
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
11
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
12
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24143
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3frv-ppjt-9bdy
13
url VCID-3k6e-zz11-93bn
vulnerability_id VCID-3k6e-zz11-93bn
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31273
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26463
published_at 2026-04-02T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.2833
published_at 2026-04-13T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28524
published_at 2026-04-04T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28318
published_at 2026-04-07T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28384
published_at 2026-04-08T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28427
published_at 2026-04-09T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28431
published_at 2026-04-11T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28387
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31273
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386268
reference_id 2386268
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386268
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31273
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3k6e-zz11-93bn
14
url VCID-3yjx-gswx-g3gt
vulnerability_id VCID-3yjx-gswx-g3gt
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23213.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23213
reference_id
reference_type
scores
0
value 0.00394
scoring_system epss
scoring_elements 0.60257
published_at 2026-04-02T12:55:00Z
1
value 0.00395
scoring_system epss
scoring_elements 0.60381
published_at 2026-04-12T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.60394
published_at 2026-04-11T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.60373
published_at 2026-04-09T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60358
published_at 2026-04-08T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60309
published_at 2026-04-07T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.60341
published_at 2026-04-04T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.60362
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120304
reference_id 120304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120304
8
reference_url https://support.apple.com/en-us/120306
reference_id 120306
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120306
9
reference_url https://support.apple.com/en-us/120309
reference_id 120309
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120309
10
reference_url https://support.apple.com/en-us/120310
reference_id 120310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120310
11
reference_url https://support.apple.com/en-us/120311
reference_id 120311
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120311
12
reference_url https://support.apple.com/en-us/120339
reference_id 120339
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120339
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270141
reference_id 2270141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270141
14
reference_url http://seclists.org/fulldisclosure/2024/Jan/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/27
15
reference_url http://seclists.org/fulldisclosure/2024/Jan/33
reference_id 33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/33
16
reference_url http://seclists.org/fulldisclosure/2024/Jan/34
reference_id 34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/34
17
reference_url http://seclists.org/fulldisclosure/2024/Jan/36
reference_id 36
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/36
18
reference_url http://seclists.org/fulldisclosure/2024/Jan/39
reference_id 39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/39
19
reference_url http://seclists.org/fulldisclosure/2024/Jan/40
reference_id 40
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/40
20
reference_url http://www.openwall.com/lists/oss-security/2024/02/05/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://www.openwall.com/lists/oss-security/2024/02/05/8
21
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
22
reference_url https://support.apple.com/en-us/HT214055
reference_id HT214055
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214055
23
reference_url https://support.apple.com/kb/HT214055
reference_id HT214055
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214055
24
reference_url https://support.apple.com/en-us/HT214056
reference_id HT214056
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214056
25
reference_url https://support.apple.com/kb/HT214056
reference_id HT214056
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214056
26
reference_url https://support.apple.com/en-us/HT214059
reference_id HT214059
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214059
27
reference_url https://support.apple.com/kb/HT214059
reference_id HT214059
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214059
28
reference_url https://support.apple.com/en-us/HT214060
reference_id HT214060
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214060
29
reference_url https://support.apple.com/kb/HT214060
reference_id HT214060
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214060
30
reference_url https://support.apple.com/en-us/HT214061
reference_id HT214061
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214061
31
reference_url https://support.apple.com/kb/HT214061
reference_id HT214061
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214061
32
reference_url https://support.apple.com/en-us/HT214063
reference_id HT214063
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214063
33
reference_url https://support.apple.com/kb/HT214063
reference_id HT214063
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214063
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
reference_id US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
36
reference_url https://usn.ubuntu.com/6631-1/
reference_id USN-6631-1
reference_type
scores
url https://usn.ubuntu.com/6631-1/
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
reference_id X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-23213
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3yjx-gswx-g3gt
15
url VCID-455j-vpxx-yudd
vulnerability_id VCID-455j-vpxx-yudd
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23284.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23284.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23284
reference_id
reference_type
scores
0
value 0.00881
scoring_system epss
scoring_elements 0.75325
published_at 2026-04-02T12:55:00Z
1
value 0.00884
scoring_system epss
scoring_elements 0.7543
published_at 2026-04-12T12:55:00Z
2
value 0.00884
scoring_system epss
scoring_elements 0.75452
published_at 2026-04-11T12:55:00Z
3
value 0.00884
scoring_system epss
scoring_elements 0.75432
published_at 2026-04-09T12:55:00Z
4
value 0.00884
scoring_system epss
scoring_elements 0.75423
published_at 2026-04-08T12:55:00Z
5
value 0.00884
scoring_system epss
scoring_elements 0.7538
published_at 2026-04-07T12:55:00Z
6
value 0.00884
scoring_system epss
scoring_elements 0.754
published_at 2026-04-04T12:55:00Z
7
value 0.00884
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23284
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120880
reference_id 120880
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120880
14
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120881
15
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120882
16
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120883
17
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120893
18
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120894
19
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120895
20
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270292
reference_id 2270292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270292
22
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
23
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
24
reference_url http://seclists.org/fulldisclosure/2024/Mar/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/26
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
reference_id AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
reference_id BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
27
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
28
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214081
29
reference_url https://support.apple.com/en-us/HT214082
reference_id HT214082
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214082
30
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214084
31
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214086
32
reference_url https://support.apple.com/en-us/HT214087
reference_id HT214087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214087
33
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214088
34
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214089
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
reference_id PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
37
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
38
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
39
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
40
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-23284
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-455j-vpxx-yudd
16
url VCID-4d1k-nwkw-j3g4
vulnerability_id VCID-4d1k-nwkw-j3g4
summary webkitgtk: webkit2gtk: Private Browsing tabs may be accessed without authentication
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40794.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40794.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40794
reference_id
reference_type
scores
0
value 0.00402
scoring_system epss
scoring_elements 0.60786
published_at 2026-04-02T12:55:00Z
1
value 0.00515
scoring_system epss
scoring_elements 0.66562
published_at 2026-04-07T12:55:00Z
2
value 0.00515
scoring_system epss
scoring_elements 0.66597
published_at 2026-04-13T12:55:00Z
3
value 0.00515
scoring_system epss
scoring_elements 0.6663
published_at 2026-04-12T12:55:00Z
4
value 0.00515
scoring_system epss
scoring_elements 0.66642
published_at 2026-04-11T12:55:00Z
5
value 0.00515
scoring_system epss
scoring_elements 0.66623
published_at 2026-04-09T12:55:00Z
6
value 0.00515
scoring_system epss
scoring_elements 0.6661
published_at 2026-04-08T12:55:00Z
7
value 0.00515
scoring_system epss
scoring_elements 0.6659
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40794
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40794
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40794
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/
url https://support.apple.com/en-us/120909
5
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/
url https://support.apple.com/en-us/120911
6
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/
url https://support.apple.com/en-us/120913
7
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
8
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
9
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2302066
reference_id 2302066
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2302066
11
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/
url https://support.apple.com/en-us/HT214117
12
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/
url https://support.apple.com/en-us/HT214119
13
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:46:28Z/
url https://support.apple.com/en-us/HT214121
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-40794
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4d1k-nwkw-j3g4
17
url VCID-4k57-k2s6-wkhx
vulnerability_id VCID-4k57-k2s6-wkhx
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20644
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.1368
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13559
published_at 2026-04-13T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13741
published_at 2026-04-04T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13542
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13623
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13674
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13644
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13607
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20644
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126353
8
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126354
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448792
reference_id 2448792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448792
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
1
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20644
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4k57-k2s6-wkhx
18
url VCID-53ct-99rf-sydt
vulnerability_id VCID-53ct-99rf-sydt
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42843.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42843
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19868
published_at 2026-04-02T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26538
published_at 2026-04-04T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.26908
published_at 2026-04-08T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26839
published_at 2026-04-07T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27689
published_at 2026-04-13T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.2779
published_at 2026-04-11T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27748
published_at 2026-04-12T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32648
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271717
reference_id 2271717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271717
14
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
15
reference_url https://support.apple.com/en-us/HT213981
reference_id HT213981
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213981
16
reference_url https://support.apple.com/en-us/HT213982
reference_id HT213982
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213982
17
reference_url https://support.apple.com/en-us/HT213984
reference_id HT213984
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213984
18
reference_url https://support.apple.com/en-us/HT213986
reference_id HT213986
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213986
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
20
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2023-42843
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53ct-99rf-sydt
19
url VCID-5q44-vqhn-zydx
vulnerability_id VCID-5q44-vqhn-zydx
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43212
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24845
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-13T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26334
published_at 2026-04-04T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26106
published_at 2026-04-07T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26173
published_at 2026-04-08T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26221
published_at 2026-04-09T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26229
published_at 2026-04-11T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26184
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386271
reference_id 2386271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386271
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43212
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q44-vqhn-zydx
20
url VCID-5x1k-uam9-5bhs
vulnerability_id VCID-5x1k-uam9-5bhs
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24162
reference_id
reference_type
scores
0
value 0.01179
scoring_system epss
scoring_elements 0.78697
published_at 2026-04-02T12:55:00Z
1
value 0.01179
scoring_system epss
scoring_elements 0.78741
published_at 2026-04-13T12:55:00Z
2
value 0.01179
scoring_system epss
scoring_elements 0.78728
published_at 2026-04-04T12:55:00Z
3
value 0.01179
scoring_system epss
scoring_elements 0.7871
published_at 2026-04-07T12:55:00Z
4
value 0.01179
scoring_system epss
scoring_elements 0.78735
published_at 2026-04-08T12:55:00Z
5
value 0.01179
scoring_system epss
scoring_elements 0.78742
published_at 2026-04-09T12:55:00Z
6
value 0.01179
scoring_system epss
scoring_elements 0.78766
published_at 2026-04-11T12:55:00Z
7
value 0.01179
scoring_system epss
scoring_elements 0.78749
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122071
reference_id 122071
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122071
7
reference_url https://support.apple.com/en-us/122072
reference_id 122072
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122072
8
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122073
9
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122074
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344624
reference_id 2344624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344624
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://access.redhat.com/errata/RHSA-2025:1957
reference_id RHSA-2025:1957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1957
13
reference_url https://access.redhat.com/errata/RHSA-2025:1958
reference_id RHSA-2025:1958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1958
14
reference_url https://access.redhat.com/errata/RHSA-2025:1959
reference_id RHSA-2025:1959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1959
15
reference_url https://access.redhat.com/errata/RHSA-2025:1960
reference_id RHSA-2025:1960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1960
16
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
17
reference_url https://access.redhat.com/errata/RHSA-2025:2035
reference_id RHSA-2025:2035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2035
18
reference_url https://access.redhat.com/errata/RHSA-2025:2121
reference_id RHSA-2025:2121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2121
19
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
20
reference_url https://access.redhat.com/errata/RHSA-2025:2126
reference_id RHSA-2025:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2126
21
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24162
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5x1k-uam9-5bhs
21
url VCID-6xkn-7q6s-5fey
vulnerability_id VCID-6xkn-7q6s-5fey
summary webkit: pointer authentication bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27834
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00773
published_at 2026-04-13T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00772
published_at 2026-04-12T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00701
published_at 2026-04-07T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00778
published_at 2026-04-11T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00784
published_at 2026-04-09T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00788
published_at 2026-04-08T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00697
published_at 2026-04-04T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00702
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2024/05/21/1
reference_id 1
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://www.openwall.com/lists/oss-security/2024/05/21/1
8
reference_url http://seclists.org/fulldisclosure/2024/May/10
reference_id 10
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/10
9
reference_url http://seclists.org/fulldisclosure/2024/May/12
reference_id 12
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/12
10
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120896
11
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120898
12
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120901
13
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120902
14
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120903
15
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120905
16
reference_url http://seclists.org/fulldisclosure/2024/May/16
reference_id 16
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/16
17
reference_url http://seclists.org/fulldisclosure/2024/May/17
reference_id 17
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/17
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282412
reference_id 2282412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282412
19
reference_url http://seclists.org/fulldisclosure/2024/May/9
reference_id 9
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/9
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/
reference_id ADCLQW54XN37VJZNYD3UKCYATJFIMYXG
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/
21
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214101
22
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214102
23
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214103
24
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214104
25
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214106
26
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
27
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
28
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
30
reference_url https://usn.ubuntu.com/6788-1/
reference_id USN-6788-1
reference_type
scores
url https://usn.ubuntu.com/6788-1/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/
reference_id WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-27834
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xkn-7q6s-5fey
22
url VCID-76jg-y2sa-f7cu
vulnerability_id VCID-76jg-y2sa-f7cu
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43501
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22817
published_at 2026-04-02T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22706
published_at 2026-04-13T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22861
published_at 2026-04-04T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22652
published_at 2026-04-07T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22728
published_at 2026-04-08T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22779
published_at 2026-04-09T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22801
published_at 2026-04-11T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22763
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43501
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125891
8
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125892
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423185
reference_id 2423185
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423185
10
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
11
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
12
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
13
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
14
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
15
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
16
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
17
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
18
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
19
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
20
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
21
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43501
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76jg-y2sa-f7cu
23
url VCID-7ehr-3myw-g7b1
vulnerability_id VCID-7ehr-3myw-g7b1
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42917
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-13T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2102
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20906
published_at 2026-04-12T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20949
published_at 2026-04-11T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20933
published_at 2026-04-09T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20792
published_at 2026-04-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21076
published_at 2026-04-04T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20872
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42917
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/12/05/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://www.openwall.com/lists/oss-security/2023/12/05/1
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
7
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253058
reference_id 2253058
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253058
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/3
10
reference_url http://seclists.org/fulldisclosure/2024/Jan/35
reference_id 35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2024/Jan/35
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/4
12
reference_url http://seclists.org/fulldisclosure/2023/Dec/5
reference_id 5
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/5
13
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
reference_id AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
15
reference_url https://www.debian.org/security/2023/dsa-5575
reference_id dsa-5575
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://www.debian.org/security/2023/dsa-5575
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://support.apple.com/en-us/HT214031
reference_id HT214031
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214031
18
reference_url https://support.apple.com/en-us/HT214032
reference_id HT214032
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214032
19
reference_url https://support.apple.com/en-us/HT214033
reference_id HT214033
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214033
20
reference_url https://support.apple.com/kb/HT214033
reference_id HT214033
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214033
21
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214034
22
reference_url https://support.apple.com/kb/HT214062
reference_id HT214062
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214062
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
reference_id P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
24
reference_url https://access.redhat.com/errata/RHSA-2023:7715
reference_id RHSA-2023:7715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7715
25
reference_url https://access.redhat.com/errata/RHSA-2023:7716
reference_id RHSA-2023:7716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7716
26
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
27
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
31
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
32
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
33
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6545-1/
reference_id USN-6545-1
reference_type
scores
url https://usn.ubuntu.com/6545-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2023-42917
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ehr-3myw-g7b1
24
url VCID-7gyr-mvmk-pfh9
vulnerability_id VCID-7gyr-mvmk-pfh9
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54467
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40598
published_at 2026-04-08T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40626
published_at 2026-04-11T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40607
published_at 2026-04-09T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40547
published_at 2026-04-07T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40625
published_at 2026-04-04T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43206
published_at 2026-04-13T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43221
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353872
reference_id 2353872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353872
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
20
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
21
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
22
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
23
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54467
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gyr-mvmk-pfh9
25
url VCID-7j7p-hnbd-hudk
vulnerability_id VCID-7j7p-hnbd-hudk
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43429
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13604
published_at 2026-04-13T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13785
published_at 2026-04-04T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13587
published_at 2026-04-07T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13667
published_at 2026-04-08T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13719
published_at 2026-04-09T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13689
published_at 2026-04-11T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13653
published_at 2026-04-12T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14338
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43429
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416330
reference_id 2416330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416330
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43429
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7j7p-hnbd-hudk
26
url VCID-7ut5-fu6w-63fs
vulnerability_id VCID-7ut5-fu6w-63fs
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43213
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-02T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31173
published_at 2026-04-13T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.31353
published_at 2026-04-04T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.31172
published_at 2026-04-07T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31225
published_at 2026-04-08T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.31256
published_at 2026-04-09T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.3126
published_at 2026-04-11T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.31216
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448781
reference_id 2448781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448781
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
1
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2025-43213
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ut5-fu6w-63fs
27
url VCID-8ncw-zt4k-73ak
vulnerability_id VCID-8ncw-zt4k-73ak
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42956.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42956
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.5347
published_at 2026-04-02T12:55:00Z
1
value 0.00302
scoring_system epss
scoring_elements 0.53526
published_at 2026-04-13T12:55:00Z
2
value 0.00302
scoring_system epss
scoring_elements 0.53495
published_at 2026-04-04T12:55:00Z
3
value 0.00302
scoring_system epss
scoring_elements 0.53464
published_at 2026-04-07T12:55:00Z
4
value 0.00302
scoring_system epss
scoring_elements 0.53515
published_at 2026-04-08T12:55:00Z
5
value 0.00302
scoring_system epss
scoring_elements 0.53512
published_at 2026-04-09T12:55:00Z
6
value 0.00302
scoring_system epss
scoring_elements 0.53561
published_at 2026-04-11T12:55:00Z
7
value 0.00302
scoring_system epss
scoring_elements 0.53544
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271719
reference_id 2271719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271719
14
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
15
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/en-us/HT214035
16
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/en-us/HT214036
17
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/en-us/HT214039
18
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/kb/HT214039
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
20
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2023-42956
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ncw-zt4k-73ak
28
url VCID-8utu-penp-rbax
vulnerability_id VCID-8utu-penp-rbax
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23280.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23280.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23280
reference_id
reference_type
scores
0
value 0.00513
scoring_system epss
scoring_elements 0.665
published_at 2026-04-02T12:55:00Z
1
value 0.00515
scoring_system epss
scoring_elements 0.66637
published_at 2026-04-12T12:55:00Z
2
value 0.00515
scoring_system epss
scoring_elements 0.6665
published_at 2026-04-11T12:55:00Z
3
value 0.00515
scoring_system epss
scoring_elements 0.66631
published_at 2026-04-09T12:55:00Z
4
value 0.00515
scoring_system epss
scoring_elements 0.6657
published_at 2026-04-07T12:55:00Z
5
value 0.00515
scoring_system epss
scoring_elements 0.66598
published_at 2026-04-04T12:55:00Z
6
value 0.00515
scoring_system epss
scoring_elements 0.66617
published_at 2026-04-08T12:55:00Z
7
value 0.00515
scoring_system epss
scoring_elements 0.66605
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23280
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120881
14
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120882
15
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120893
16
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120894
17
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120895
18
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270291
reference_id 2270291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270291
20
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
21
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
reference_id AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
reference_id BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
24
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
25
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214081
26
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214084
27
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214086
28
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214088
29
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214089
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
reference_id PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
32
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
33
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-23280
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8utu-penp-rbax
29
url VCID-988h-sqnj-57fg
vulnerability_id VCID-988h-sqnj-57fg
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43511
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19277
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-12T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19184
published_at 2026-04-11T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19178
published_at 2026-04-09T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19125
published_at 2026-04-08T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.1933
published_at 2026-04-04T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19045
published_at 2026-04-07T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24919
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125633
5
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125884
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125890
8
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125891
9
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125892
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448787
reference_id 2448787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448787
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
1
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2025-43511
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-988h-sqnj-57fg
30
url VCID-9dnz-1f32-gfdp
vulnerability_id VCID-9dnz-1f32-gfdp
summary webkitgtk: A malicious website may exfiltrate data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43480.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43480.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43480
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08118
published_at 2026-04-13T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08128
published_at 2026-04-04T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08079
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.0814
published_at 2026-04-08T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08162
published_at 2026-04-09T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08154
published_at 2026-04-11T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08135
published_at 2026-04-12T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08458
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416338
reference_id 2416338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416338
11
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
12
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
13
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
14
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
15
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
16
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
17
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
18
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
19
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2025-43480
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dnz-1f32-gfdp
31
url VCID-9j6k-np3x-23f7
vulnerability_id VCID-9j6k-np3x-23f7
summary webkit: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54508
reference_id
reference_type
scores
0
value 0.01383
scoring_system epss
scoring_elements 0.80301
published_at 2026-04-13T12:55:00Z
1
value 0.01383
scoring_system epss
scoring_elements 0.80278
published_at 2026-04-04T12:55:00Z
2
value 0.01383
scoring_system epss
scoring_elements 0.80266
published_at 2026-04-07T12:55:00Z
3
value 0.01383
scoring_system epss
scoring_elements 0.80293
published_at 2026-04-08T12:55:00Z
4
value 0.01383
scoring_system epss
scoring_elements 0.80304
published_at 2026-04-09T12:55:00Z
5
value 0.01383
scoring_system epss
scoring_elements 0.80323
published_at 2026-04-11T12:55:00Z
6
value 0.01383
scoring_system epss
scoring_elements 0.80308
published_at 2026-04-12T12:55:00Z
7
value 0.01438
scoring_system epss
scoring_elements 0.80656
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121846
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/122372
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333845
reference_id 2333845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333845
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54508
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9j6k-np3x-23f7
32
url VCID-ahcu-937r-57fu
vulnerability_id VCID-ahcu-937r-57fu
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43430
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.2633
published_at 2026-04-13T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26528
published_at 2026-04-04T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26308
published_at 2026-04-07T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26376
published_at 2026-04-08T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26426
published_at 2026-04-09T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26434
published_at 2026-04-11T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26388
published_at 2026-04-12T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27201
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416331
reference_id 2416331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416331
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43430
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahcu-937r-57fu
33
url VCID-aqvh-emss-bufx
vulnerability_id VCID-aqvh-emss-bufx
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43368
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14812
published_at 2026-04-04T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14617
published_at 2026-04-07T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14706
published_at 2026-04-08T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14765
published_at 2026-04-09T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15105
published_at 2026-04-02T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17153
published_at 2026-04-11T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17106
published_at 2026-04-12T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17045
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/
url https://support.apple.com/en-us/125113
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397630
reference_id 2397630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397630
7
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
8
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
9
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
10
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
11
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
12
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
13
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
14
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
15
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
16
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
17
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
18
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43368
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aqvh-emss-bufx
34
url VCID-az2z-2mnu-sfbh
vulnerability_id VCID-az2z-2mnu-sfbh
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43419
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10526
published_at 2026-04-13T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10546
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10411
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10484
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10552
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10581
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10548
published_at 2026-04-12T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11092
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125113
6
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125114
7
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125115
8
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125116
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416326
reference_id 2416326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416326
10
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
11
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
12
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
13
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
14
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
15
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
16
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
17
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
18
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
19
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43419
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-az2z-2mnu-sfbh
35
url VCID-azef-hxum-z3eb
vulnerability_id VCID-azef-hxum-z3eb
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23755
published_at 2026-04-04T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23536
published_at 2026-04-07T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24888
published_at 2026-04-13T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-08T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24969
published_at 2026-04-09T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-11T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24943
published_at 2026-04-12T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27125
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122281
reference_id 122281
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122281
5
reference_url https://support.apple.com/en-us/122283
reference_id 122283
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122283
6
reference_url https://support.apple.com/en-us/122284
reference_id 122284
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122284
7
reference_url https://support.apple.com/en-us/122285
reference_id 122285
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122285
8
reference_url https://support.apple.com/en-us/122345
reference_id 122345
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122345
9
reference_url https://support.apple.com/en-us/122346
reference_id 122346
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122346
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122372
11
reference_url https://support.apple.com/en-us/122376
reference_id 122376
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122376
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
reference_id 2351802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
13
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://access.redhat.com/errata/RHSA-2025:2863
reference_id RHSA-2025:2863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2863
16
reference_url https://access.redhat.com/errata/RHSA-2025:2864
reference_id RHSA-2025:2864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2864
17
reference_url https://access.redhat.com/errata/RHSA-2025:2997
reference_id RHSA-2025:2997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2997
18
reference_url https://access.redhat.com/errata/RHSA-2025:2998
reference_id RHSA-2025:2998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2998
19
reference_url https://access.redhat.com/errata/RHSA-2025:3000
reference_id RHSA-2025:3000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3000
20
reference_url https://access.redhat.com/errata/RHSA-2025:3001
reference_id RHSA-2025:3001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3001
21
reference_url https://access.redhat.com/errata/RHSA-2025:3002
reference_id RHSA-2025:3002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3002
22
reference_url https://access.redhat.com/errata/RHSA-2025:3005
reference_id RHSA-2025:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3005
23
reference_url https://access.redhat.com/errata/RHSA-2025:3034
reference_id RHSA-2025:3034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3034
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24201
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azef-hxum-z3eb
36
url VCID-b3dw-sj5b-5bhr
vulnerability_id VCID-b3dw-sj5b-5bhr
summary webkit: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54502
reference_id
reference_type
scores
0
value 0.05739
scoring_system epss
scoring_elements 0.9041
published_at 2026-04-02T12:55:00Z
1
value 0.07285
scoring_system epss
scoring_elements 0.9167
published_at 2026-04-12T12:55:00Z
2
value 0.07285
scoring_system epss
scoring_elements 0.91637
published_at 2026-04-04T12:55:00Z
3
value 0.07285
scoring_system epss
scoring_elements 0.91645
published_at 2026-04-07T12:55:00Z
4
value 0.07285
scoring_system epss
scoring_elements 0.91658
published_at 2026-04-08T12:55:00Z
5
value 0.07285
scoring_system epss
scoring_elements 0.91664
published_at 2026-04-09T12:55:00Z
6
value 0.07285
scoring_system epss
scoring_elements 0.91667
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121846
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333843
reference_id 2333843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333843
11
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
12
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
13
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
14
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
15
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
16
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
17
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
18
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
19
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54502
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3dw-sj5b-5bhr
37
url VCID-b8ws-1k92-7bhq
vulnerability_id VCID-b8ws-1k92-7bhq
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54543
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33157
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.3462
published_at 2026-04-13T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.3473
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34607
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34651
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34683
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34644
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121846
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/122372
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344619
reference_id 2344619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344619
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:1957
reference_id RHSA-2025:1957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1957
14
reference_url https://access.redhat.com/errata/RHSA-2025:1958
reference_id RHSA-2025:1958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1958
15
reference_url https://access.redhat.com/errata/RHSA-2025:1959
reference_id RHSA-2025:1959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1959
16
reference_url https://access.redhat.com/errata/RHSA-2025:1960
reference_id RHSA-2025:1960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1960
17
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
18
reference_url https://access.redhat.com/errata/RHSA-2025:2035
reference_id RHSA-2025:2035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2035
19
reference_url https://access.redhat.com/errata/RHSA-2025:2121
reference_id RHSA-2025:2121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2121
20
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
21
reference_url https://access.redhat.com/errata/RHSA-2025:2126
reference_id RHSA-2025:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2126
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54543
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ws-1k92-7bhq
38
url VCID-bjtx-twmy-jbgk
vulnerability_id VCID-bjtx-twmy-jbgk
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43438
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10647
published_at 2026-04-13T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10558
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1063
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10689
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10703
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10671
published_at 2026-04-12T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43438
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448784
reference_id 2448784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448784
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43438
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjtx-twmy-jbgk
39
url VCID-bkcz-d48v-7uca
vulnerability_id VCID-bkcz-d48v-7uca
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24213
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31973
published_at 2026-04-02T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31846
published_at 2026-04-13T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.32016
published_at 2026-04-04T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31836
published_at 2026-04-07T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31888
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31916
published_at 2026-04-09T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31921
published_at 2026-04-11T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31881
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357913
reference_id 2357913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357913
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24213
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcz-d48v-7uca
40
url VCID-c4np-b4zq-tkch
vulnerability_id VCID-c4np-b4zq-tkch
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31204
reference_id
reference_type
scores
0
value 0.00666
scoring_system epss
scoring_elements 0.71229
published_at 2026-04-13T12:55:00Z
1
value 0.00666
scoring_system epss
scoring_elements 0.71188
published_at 2026-04-02T12:55:00Z
2
value 0.00666
scoring_system epss
scoring_elements 0.71206
published_at 2026-04-04T12:55:00Z
3
value 0.00666
scoring_system epss
scoring_elements 0.71181
published_at 2026-04-07T12:55:00Z
4
value 0.00666
scoring_system epss
scoring_elements 0.71223
published_at 2026-04-08T12:55:00Z
5
value 0.00666
scoring_system epss
scoring_elements 0.71237
published_at 2026-04-09T12:55:00Z
6
value 0.00666
scoring_system epss
scoring_elements 0.7126
published_at 2026-04-11T12:55:00Z
7
value 0.00666
scoring_system epss
scoring_elements 0.71245
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366500
reference_id 2366500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366500
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31204
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4np-b4zq-tkch
41
url VCID-c9mb-24v2-q3ba
vulnerability_id VCID-c9mb-24v2-q3ba
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31215
reference_id
reference_type
scores
0
value 0.01121
scoring_system epss
scoring_elements 0.78251
published_at 2026-04-13T12:55:00Z
1
value 0.01121
scoring_system epss
scoring_elements 0.78203
published_at 2026-04-02T12:55:00Z
2
value 0.01121
scoring_system epss
scoring_elements 0.78233
published_at 2026-04-04T12:55:00Z
3
value 0.01121
scoring_system epss
scoring_elements 0.78215
published_at 2026-04-07T12:55:00Z
4
value 0.01121
scoring_system epss
scoring_elements 0.78242
published_at 2026-04-08T12:55:00Z
5
value 0.01121
scoring_system epss
scoring_elements 0.78247
published_at 2026-04-09T12:55:00Z
6
value 0.01121
scoring_system epss
scoring_elements 0.78272
published_at 2026-04-11T12:55:00Z
7
value 0.01121
scoring_system epss
scoring_elements 0.78256
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31215
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366503
reference_id 2366503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366503
12
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
13
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
14
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
15
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
19
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
20
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
21
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31215
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mb-24v2-q3ba
42
url VCID-ceyb-j3sq-27fh
vulnerability_id VCID-ceyb-j3sq-27fh
summary webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27856.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27856
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.07092
published_at 2026-04-13T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06996
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.07049
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.07029
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.07084
published_at 2026-04-08T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.07114
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.07103
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120896
5
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120898
6
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120901
7
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120902
8
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120903
9
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120905
10
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120906
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344618
reference_id 2344618
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344618
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
14
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
15
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
16
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-27856
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ceyb-j3sq-27fh
43
url VCID-cmdy-ztbw-jffq
vulnerability_id VCID-cmdy-ztbw-jffq
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54551
reference_id
reference_type
scores
0
value 0.00504
scoring_system epss
scoring_elements 0.66155
published_at 2026-04-13T12:55:00Z
1
value 0.00504
scoring_system epss
scoring_elements 0.66123
published_at 2026-04-02T12:55:00Z
2
value 0.00504
scoring_system epss
scoring_elements 0.6615
published_at 2026-04-04T12:55:00Z
3
value 0.00504
scoring_system epss
scoring_elements 0.66118
published_at 2026-04-07T12:55:00Z
4
value 0.00504
scoring_system epss
scoring_elements 0.66167
published_at 2026-04-08T12:55:00Z
5
value 0.00504
scoring_system epss
scoring_elements 0.6618
published_at 2026-04-09T12:55:00Z
6
value 0.00504
scoring_system epss
scoring_elements 0.66199
published_at 2026-04-11T12:55:00Z
7
value 0.00504
scoring_system epss
scoring_elements 0.66186
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120909
5
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120911
6
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120913
7
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120914
8
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120915
9
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120916
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357909
reference_id 2357909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357909
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
20
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
21
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
22
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
23
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54551
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmdy-ztbw-jffq
44
url VCID-cw56-pdyr-fbge
vulnerability_id VCID-cw56-pdyr-fbge
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24216
reference_id
reference_type
scores
0
value 0.00821
scoring_system epss
scoring_elements 0.74363
published_at 2026-04-02T12:55:00Z
1
value 0.00821
scoring_system epss
scoring_elements 0.74405
published_at 2026-04-13T12:55:00Z
2
value 0.00821
scoring_system epss
scoring_elements 0.7439
published_at 2026-04-04T12:55:00Z
3
value 0.00821
scoring_system epss
scoring_elements 0.74364
published_at 2026-04-07T12:55:00Z
4
value 0.00821
scoring_system epss
scoring_elements 0.74397
published_at 2026-04-08T12:55:00Z
5
value 0.00821
scoring_system epss
scoring_elements 0.74412
published_at 2026-04-09T12:55:00Z
6
value 0.00821
scoring_system epss
scoring_elements 0.74433
published_at 2026-04-11T12:55:00Z
7
value 0.00821
scoring_system epss
scoring_elements 0.74413
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357917
reference_id 2357917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357917
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24216
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cw56-pdyr-fbge
45
url VCID-dd4q-8fs5-3kej
vulnerability_id VCID-dd4q-8fs5-3kej
summary webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44308
reference_id
reference_type
scores
0
value 0.01547
scoring_system epss
scoring_elements 0.81399
published_at 2026-04-13T12:55:00Z
1
value 0.01547
scoring_system epss
scoring_elements 0.81343
published_at 2026-04-02T12:55:00Z
2
value 0.01547
scoring_system epss
scoring_elements 0.81366
published_at 2026-04-04T12:55:00Z
3
value 0.01547
scoring_system epss
scoring_elements 0.81364
published_at 2026-04-07T12:55:00Z
4
value 0.01547
scoring_system epss
scoring_elements 0.81393
published_at 2026-04-08T12:55:00Z
5
value 0.01547
scoring_system epss
scoring_elements 0.81397
published_at 2026-04-09T12:55:00Z
6
value 0.01547
scoring_system epss
scoring_elements 0.81419
published_at 2026-04-11T12:55:00Z
7
value 0.01547
scoring_system epss
scoring_elements 0.81406
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121752
reference_id 121752
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121752
5
reference_url https://support.apple.com/en-us/121753
reference_id 121753
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121753
6
reference_url https://support.apple.com/en-us/121754
reference_id 121754
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121754
7
reference_url https://support.apple.com/en-us/121755
reference_id 121755
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121755
8
reference_url https://support.apple.com/en-us/121756
reference_id 121756
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121756
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327931
reference_id 2327931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327931
10
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
11
reference_url https://usn.ubuntu.com/7142-1/
reference_id USN-7142-1
reference_type
scores
url https://usn.ubuntu.com/7142-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44308
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dd4q-8fs5-3kej
46
url VCID-dvx9-km9t-yqfv
vulnerability_id VCID-dvx9-km9t-yqfv
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43531
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30817
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30687
published_at 2026-04-13T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30865
published_at 2026-04-04T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30683
published_at 2026-04-07T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30742
published_at 2026-04-08T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30774
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30777
published_at 2026-04-11T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30733
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125889
reference_id 125889
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125889
8
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125890
9
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125891
10
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125892
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423187
reference_id 2423187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423187
12
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
13
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
14
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
15
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
16
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
17
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
18
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
19
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
20
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
21
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
22
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
23
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43531
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvx9-km9t-yqfv
47
url VCID-dxsm-nf4f-yfe4
vulnerability_id VCID-dxsm-nf4f-yfe4
summary webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27833
reference_id
reference_type
scores
0
value 0.01223
scoring_system epss
scoring_elements 0.79105
published_at 2026-04-13T12:55:00Z
1
value 0.01223
scoring_system epss
scoring_elements 0.79087
published_at 2026-04-04T12:55:00Z
2
value 0.01223
scoring_system epss
scoring_elements 0.79072
published_at 2026-04-07T12:55:00Z
3
value 0.01223
scoring_system epss
scoring_elements 0.79097
published_at 2026-04-08T12:55:00Z
4
value 0.01223
scoring_system epss
scoring_elements 0.79104
published_at 2026-04-09T12:55:00Z
5
value 0.01223
scoring_system epss
scoring_elements 0.79128
published_at 2026-04-11T12:55:00Z
6
value 0.01223
scoring_system epss
scoring_elements 0.79115
published_at 2026-04-12T12:55:00Z
7
value 0.01652
scoring_system epss
scoring_elements 0.81967
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27833
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120898
9
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120901
10
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120905
11
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120906
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314700
reference_id 2314700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314700
13
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
14
reference_url https://support.apple.com/en-us/HT214100
reference_id HT214100
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214100
15
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214101
16
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214102
17
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214103
18
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214108
19
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
20
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
23
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
24
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
25
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
26
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-27833
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxsm-nf4f-yfe4
48
url VCID-e5f7-5sx3-27b1
vulnerability_id VCID-e5f7-5sx3-27b1
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42916
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14646
published_at 2026-04-13T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14571
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.147
published_at 2026-04-12T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14738
published_at 2026-04-11T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14593
published_at 2026-04-09T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14451
published_at 2026-04-07T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14641
published_at 2026-04-04T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.1454
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42916
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/12/05/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/12/05/1
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
7
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253054
reference_id 2253054
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253054
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/3
reference_id 3
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/3
10
reference_url http://seclists.org/fulldisclosure/2024/Jan/35
reference_id 35
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2024/Jan/35
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/4
reference_id 4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/4
12
reference_url http://seclists.org/fulldisclosure/2023/Dec/5
reference_id 5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/5
13
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
reference_id AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
15
reference_url https://www.debian.org/security/2023/dsa-5575
reference_id dsa-5575
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://www.debian.org/security/2023/dsa-5575
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://support.apple.com/en-us/HT214031
reference_id HT214031
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214031
18
reference_url https://support.apple.com/en-us/HT214032
reference_id HT214032
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214032
19
reference_url https://support.apple.com/en-us/HT214033
reference_id HT214033
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214033
20
reference_url https://support.apple.com/kb/HT214033
reference_id HT214033
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214033
21
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214034
22
reference_url https://support.apple.com/kb/HT214062
reference_id HT214062
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214062
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
reference_id P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
24
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
25
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/6545-1/
reference_id USN-6545-1
reference_type
scores
url https://usn.ubuntu.com/6545-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2023-42916
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e5f7-5sx3-27b1
49
url VCID-ednn-ppw1-myfk
vulnerability_id VCID-ednn-ppw1-myfk
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43272
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14693
published_at 2026-04-02T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19812
published_at 2026-04-04T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19667
published_at 2026-04-09T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19614
published_at 2026-04-08T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19534
published_at 2026-04-07T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21985
published_at 2026-04-13T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22086
published_at 2026-04-11T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22045
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43272
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125113
6
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125115
7
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125116
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397626
reference_id 2397626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397626
9
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
10
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
11
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
12
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
13
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
14
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
15
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
16
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
17
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
18
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
19
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
20
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43272
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ednn-ppw1-myfk
50
url VCID-ems1-41u6-vbex
vulnerability_id VCID-ems1-41u6-vbex
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43458
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21944
published_at 2026-04-13T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22117
published_at 2026-04-04T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.21892
published_at 2026-04-07T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.21974
published_at 2026-04-08T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22029
published_at 2026-04-09T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22044
published_at 2026-04-11T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.22003
published_at 2026-04-12T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22678
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418855
reference_id 2418855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418855
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43458
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ems1-41u6-vbex
51
url VCID-epzj-t14z-43d2
vulnerability_id VCID-epzj-t14z-43d2
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43421
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08307
published_at 2026-04-13T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08327
published_at 2026-04-04T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08272
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08336
published_at 2026-04-08T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08353
published_at 2026-04-09T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08344
published_at 2026-04-11T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08324
published_at 2026-04-12T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08623
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125638
7
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125640
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416355
reference_id 2416355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416355
9
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
10
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
11
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
12
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
13
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
14
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
15
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
16
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
17
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
18
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
19
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
20
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43421
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epzj-t14z-43d2
52
url VCID-ey9n-zksh-mbfm
vulnerability_id VCID-ey9n-zksh-mbfm
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31206
reference_id
reference_type
scores
0
value 0.01111
scoring_system epss
scoring_elements 0.78151
published_at 2026-04-13T12:55:00Z
1
value 0.01111
scoring_system epss
scoring_elements 0.78103
published_at 2026-04-02T12:55:00Z
2
value 0.01111
scoring_system epss
scoring_elements 0.78133
published_at 2026-04-04T12:55:00Z
3
value 0.01111
scoring_system epss
scoring_elements 0.78116
published_at 2026-04-07T12:55:00Z
4
value 0.01111
scoring_system epss
scoring_elements 0.78142
published_at 2026-04-08T12:55:00Z
5
value 0.01111
scoring_system epss
scoring_elements 0.78148
published_at 2026-04-09T12:55:00Z
6
value 0.01111
scoring_system epss
scoring_elements 0.78173
published_at 2026-04-11T12:55:00Z
7
value 0.01111
scoring_system epss
scoring_elements 0.78155
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366502
reference_id 2366502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366502
12
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
13
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
14
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
15
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
19
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
20
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
21
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31206
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ey9n-zksh-mbfm
53
url VCID-fcdg-eddn-cbd2
vulnerability_id VCID-fcdg-eddn-cbd2
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23206.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23206
reference_id
reference_type
scores
0
value 0.00516
scoring_system epss
scoring_elements 0.66638
published_at 2026-04-02T12:55:00Z
1
value 0.00518
scoring_system epss
scoring_elements 0.66777
published_at 2026-04-12T12:55:00Z
2
value 0.00518
scoring_system epss
scoring_elements 0.66791
published_at 2026-04-11T12:55:00Z
3
value 0.00518
scoring_system epss
scoring_elements 0.66771
published_at 2026-04-09T12:55:00Z
4
value 0.00518
scoring_system epss
scoring_elements 0.66756
published_at 2026-04-08T12:55:00Z
5
value 0.00518
scoring_system epss
scoring_elements 0.66735
published_at 2026-04-04T12:55:00Z
6
value 0.00518
scoring_system epss
scoring_elements 0.66707
published_at 2026-04-07T12:55:00Z
7
value 0.00518
scoring_system epss
scoring_elements 0.66748
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120304
reference_id 120304
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/120304
8
reference_url https://support.apple.com/en-us/120306
reference_id 120306
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/120306
9
reference_url https://support.apple.com/en-us/120309
reference_id 120309
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/120309
10
reference_url https://support.apple.com/en-us/120310
reference_id 120310
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/120310
11
reference_url https://support.apple.com/en-us/120311
reference_id 120311
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/120311
12
reference_url https://support.apple.com/en-us/120339
reference_id 120339
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/120339
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2269743
reference_id 2269743
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2269743
14
reference_url http://seclists.org/fulldisclosure/2024/Jan/27
reference_id 27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url http://seclists.org/fulldisclosure/2024/Jan/27
15
reference_url http://seclists.org/fulldisclosure/2024/Jan/33
reference_id 33
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url http://seclists.org/fulldisclosure/2024/Jan/33
16
reference_url http://seclists.org/fulldisclosure/2024/Jan/34
reference_id 34
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url http://seclists.org/fulldisclosure/2024/Jan/34
17
reference_url http://seclists.org/fulldisclosure/2024/Jan/36
reference_id 36
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url http://seclists.org/fulldisclosure/2024/Jan/36
18
reference_url http://seclists.org/fulldisclosure/2024/Jan/39
reference_id 39
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url http://seclists.org/fulldisclosure/2024/Jan/39
19
reference_url http://seclists.org/fulldisclosure/2024/Jan/40
reference_id 40
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url http://seclists.org/fulldisclosure/2024/Jan/40
20
reference_url http://www.openwall.com/lists/oss-security/2024/02/05/8
reference_id 8
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url http://www.openwall.com/lists/oss-security/2024/02/05/8
21
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
22
reference_url https://support.apple.com/en-us/HT214055
reference_id HT214055
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/HT214055
23
reference_url https://support.apple.com/kb/HT214055
reference_id HT214055
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/kb/HT214055
24
reference_url https://support.apple.com/en-us/HT214056
reference_id HT214056
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/HT214056
25
reference_url https://support.apple.com/kb/HT214056
reference_id HT214056
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/kb/HT214056
26
reference_url https://support.apple.com/en-us/HT214059
reference_id HT214059
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/HT214059
27
reference_url https://support.apple.com/kb/HT214059
reference_id HT214059
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/kb/HT214059
28
reference_url https://support.apple.com/en-us/HT214060
reference_id HT214060
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/HT214060
29
reference_url https://support.apple.com/kb/HT214060
reference_id HT214060
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/kb/HT214060
30
reference_url https://support.apple.com/en-us/HT214061
reference_id HT214061
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/HT214061
31
reference_url https://support.apple.com/kb/HT214061
reference_id HT214061
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/kb/HT214061
32
reference_url https://support.apple.com/en-us/HT214063
reference_id HT214063
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/en-us/HT214063
33
reference_url https://support.apple.com/kb/HT214063
reference_id HT214063
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://support.apple.com/kb/HT214063
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
reference_id US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
35
reference_url https://usn.ubuntu.com/6631-1/
reference_id USN-6631-1
reference_type
scores
url https://usn.ubuntu.com/6631-1/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
reference_id X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T14:46:17Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-23206
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fcdg-eddn-cbd2
54
url VCID-fzqz-yfn1-7yfd
vulnerability_id VCID-fzqz-yfn1-7yfd
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31257
reference_id
reference_type
scores
0
value 0.00799
scoring_system epss
scoring_elements 0.7403
published_at 2026-04-13T12:55:00Z
1
value 0.00799
scoring_system epss
scoring_elements 0.73989
published_at 2026-04-02T12:55:00Z
2
value 0.00799
scoring_system epss
scoring_elements 0.74015
published_at 2026-04-04T12:55:00Z
3
value 0.00799
scoring_system epss
scoring_elements 0.73986
published_at 2026-04-07T12:55:00Z
4
value 0.00799
scoring_system epss
scoring_elements 0.7402
published_at 2026-04-08T12:55:00Z
5
value 0.00799
scoring_system epss
scoring_elements 0.74034
published_at 2026-04-09T12:55:00Z
6
value 0.00799
scoring_system epss
scoring_elements 0.74056
published_at 2026-04-11T12:55:00Z
7
value 0.00799
scoring_system epss
scoring_elements 0.74037
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31257
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366504
reference_id 2366504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366504
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://access.redhat.com/errata/RHSA-2025:7995
reference_id RHSA-2025:7995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7995
17
reference_url https://access.redhat.com/errata/RHSA-2025:8046
reference_id RHSA-2025:8046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8046
18
reference_url https://access.redhat.com/errata/RHSA-2025:8530
reference_id RHSA-2025:8530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8530
19
reference_url https://access.redhat.com/errata/RHSA-2025:8532
reference_id RHSA-2025:8532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8532
20
reference_url https://access.redhat.com/errata/RHSA-2025:8533
reference_id RHSA-2025:8533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8533
21
reference_url https://access.redhat.com/errata/RHSA-2025:8534
reference_id RHSA-2025:8534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8534
22
reference_url https://access.redhat.com/errata/RHSA-2025:8541
reference_id RHSA-2025:8541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8541
23
reference_url https://access.redhat.com/errata/RHSA-2025:8600
reference_id RHSA-2025:8600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8600
24
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31257
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fzqz-yfn1-7yfd
55
url VCID-g2uh-tzx9-bqc7
vulnerability_id VCID-g2uh-tzx9-bqc7
summary webkitgtk: Processing web content may lead to a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54658
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39859
published_at 2026-04-02T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39882
published_at 2026-04-04T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40467
published_at 2026-04-08T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40416
published_at 2026-04-07T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.4428
published_at 2026-04-13T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.44295
published_at 2026-04-09T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44313
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54658
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120881
13
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120882
14
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120883
15
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120893
16
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120894
17
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120895
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344946
reference_id 2344946
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344946
19
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
20
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-54658
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2uh-tzx9-bqc7
56
url VCID-gjvy-329h-dkgp
vulnerability_id VCID-gjvy-329h-dkgp
summary webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27838.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27838.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27838
reference_id
reference_type
scores
0
value 0.0089
scoring_system epss
scoring_elements 0.75521
published_at 2026-04-13T12:55:00Z
1
value 0.0089
scoring_system epss
scoring_elements 0.755
published_at 2026-04-04T12:55:00Z
2
value 0.0089
scoring_system epss
scoring_elements 0.7548
published_at 2026-04-07T12:55:00Z
3
value 0.0089
scoring_system epss
scoring_elements 0.75522
published_at 2026-04-08T12:55:00Z
4
value 0.0089
scoring_system epss
scoring_elements 0.75532
published_at 2026-04-09T12:55:00Z
5
value 0.0089
scoring_system epss
scoring_elements 0.75551
published_at 2026-04-11T12:55:00Z
6
value 0.0089
scoring_system epss
scoring_elements 0.7553
published_at 2026-04-12T12:55:00Z
7
value 0.01346
scoring_system epss
scoring_elements 0.80031
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27838
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120896
5
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120898
6
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120901
7
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120902
8
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120903
9
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120905
10
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120906
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314702
reference_id 2314702
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314702
12
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
13
reference_url https://support.apple.com/en-us/HT214100
reference_id HT214100
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214100
14
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214101
15
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214102
16
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214103
17
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214104
18
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214106
19
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214108
20
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
21
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-27838
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjvy-329h-dkgp
57
url VCID-gn1n-fjzp-hqe2
vulnerability_id VCID-gn1n-fjzp-hqe2
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43010
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.1427
published_at 2026-04-12T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14354
published_at 2026-04-02T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14309
published_at 2026-04-11T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14362
published_at 2026-04-09T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14308
published_at 2026-04-08T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14418
published_at 2026-04-04T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14225
published_at 2026-04-07T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15601
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://support.apple.com/en-us/120300
reference_id 120300
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/120300
13
reference_url https://support.apple.com/en-us/120877
reference_id 120877
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/120877
14
reference_url https://support.apple.com/en-us/120879
reference_id 120879
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/120879
15
reference_url https://support.apple.com/en-us/126632
reference_id 126632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/126632
16
reference_url https://support.apple.com/en-us/126646
reference_id 126646
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/126646
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448778
reference_id 2448778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448778
18
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
19
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
22
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
23
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
24
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
25
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
26
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2023-43010
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gn1n-fjzp-hqe2
58
url VCID-gqjq-p4re-gkf6
vulnerability_id VCID-gqjq-p4re-gkf6
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43425
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10285
published_at 2026-04-13T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10283
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10179
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10253
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10315
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10345
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10304
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10752
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43425
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416327
reference_id 2416327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416327
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43425
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqjq-p4re-gkf6
59
url VCID-gwt6-n8ue-mqcf
vulnerability_id VCID-gwt6-n8ue-mqcf
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31277
reference_id
reference_type
scores
0
value 0.00176
scoring_system epss
scoring_elements 0.3912
published_at 2026-04-13T12:55:00Z
1
value 0.00176
scoring_system epss
scoring_elements 0.39173
published_at 2026-04-04T12:55:00Z
2
value 0.00176
scoring_system epss
scoring_elements 0.39092
published_at 2026-04-07T12:55:00Z
3
value 0.00176
scoring_system epss
scoring_elements 0.39147
published_at 2026-04-08T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39163
published_at 2026-04-09T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39175
published_at 2026-04-11T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39139
published_at 2026-04-12T12:55:00Z
7
value 0.00192
scoring_system epss
scoring_elements 0.4111
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448780
reference_id 2448780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448780
11
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
12
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
13
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
14
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
15
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
16
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
17
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
18
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
19
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
20
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31277
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwt6-n8ue-mqcf
60
url VCID-h7uu-gj11-a3er
vulnerability_id VCID-h7uu-gj11-a3er
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23263.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23263.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23263
reference_id
reference_type
scores
0
value 0.00618
scoring_system epss
scoring_elements 0.69912
published_at 2026-04-02T12:55:00Z
1
value 0.0062
scoring_system epss
scoring_elements 0.70044
published_at 2026-04-12T12:55:00Z
2
value 0.0062
scoring_system epss
scoring_elements 0.7006
published_at 2026-04-11T12:55:00Z
3
value 0.0062
scoring_system epss
scoring_elements 0.70036
published_at 2026-04-09T12:55:00Z
4
value 0.0062
scoring_system epss
scoring_elements 0.7002
published_at 2026-04-08T12:55:00Z
5
value 0.0062
scoring_system epss
scoring_elements 0.69996
published_at 2026-04-04T12:55:00Z
6
value 0.0062
scoring_system epss
scoring_elements 0.69972
published_at 2026-04-07T12:55:00Z
7
value 0.0062
scoring_system epss
scoring_elements 0.70031
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23263
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120880
reference_id 120880
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120880
14
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120881
15
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120882
16
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120883
17
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120893
18
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120894
19
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120895
20
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270290
reference_id 2270290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270290
22
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
23
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
24
reference_url http://seclists.org/fulldisclosure/2024/Mar/26
reference_id 26
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/26
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
reference_id AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
reference_id BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
27
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
28
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214081
29
reference_url https://support.apple.com/en-us/HT214082
reference_id HT214082
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214082
30
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214084
31
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214086
32
reference_url https://support.apple.com/en-us/HT214087
reference_id HT214087
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214087
33
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214088
34
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214089
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
reference_id PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
37
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
38
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
39
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
40
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-23263
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7uu-gj11-a3er
61
url VCID-hp6k-spzk-vbaa
vulnerability_id VCID-hp6k-spzk-vbaa
summary webkitgtk: Copying a URL from Web Inspector may lead to command injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24150
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53944
published_at 2026-04-02T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.5401
published_at 2026-04-13T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53971
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53947
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.53999
published_at 2026-04-08T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.53998
published_at 2026-04-09T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54045
published_at 2026-04-11T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.54028
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/
url https://support.apple.com/en-us/122074
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344622
reference_id 2344622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344622
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
10
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
11
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24150
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hp6k-spzk-vbaa
62
url VCID-hvj6-wsg9-1bhg
vulnerability_id VCID-hvj6-wsg9-1bhg
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43265
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04829
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.0543
published_at 2026-04-13T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05414
published_at 2026-04-04T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05422
published_at 2026-04-07T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05457
published_at 2026-04-08T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.05478
published_at 2026-04-09T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.0545
published_at 2026-04-11T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.05436
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43265
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386276
reference_id 2386276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386276
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43265
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvj6-wsg9-1bhg
63
url VCID-j31g-7h17-27c8
vulnerability_id VCID-j31g-7h17-27c8
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43541
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13378
published_at 2026-04-02T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13255
published_at 2026-04-13T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13443
published_at 2026-04-04T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13239
published_at 2026-04-07T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13321
published_at 2026-04-08T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13373
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13342
published_at 2026-04-11T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13304
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125891
8
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125892
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423191
reference_id 2423191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423191
10
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
11
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
12
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
13
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
14
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
15
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
16
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
17
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
18
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
19
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
20
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
21
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43541
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j31g-7h17-27c8
64
url VCID-jbuw-yp7v-4fcz
vulnerability_id VCID-jbuw-yp7v-4fcz
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31223
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66868
published_at 2026-04-13T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66859
published_at 2026-04-04T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.66831
published_at 2026-04-07T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66881
published_at 2026-04-08T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66894
published_at 2026-04-09T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66914
published_at 2026-04-11T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.669
published_at 2026-04-12T12:55:00Z
7
value 0.00534
scoring_system epss
scoring_elements 0.67378
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31223
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448779
reference_id 2448779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448779
11
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
12
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
13
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
14
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
15
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
16
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
17
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
18
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
19
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
20
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31223
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jbuw-yp7v-4fcz
65
url VCID-jyw2-fu8s-3fha
vulnerability_id VCID-jyw2-fu8s-3fha
summary Google Chrome: chromium: webkitgtk: Out of bounds memory access via crafted HTML page
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14174
reference_id
reference_type
scores
0
value 0.00871
scoring_system epss
scoring_elements 0.75156
published_at 2026-04-02T12:55:00Z
1
value 0.00871
scoring_system epss
scoring_elements 0.75187
published_at 2026-04-04T12:55:00Z
2
value 0.00871
scoring_system epss
scoring_elements 0.75163
published_at 2026-04-07T12:55:00Z
3
value 0.00871
scoring_system epss
scoring_elements 0.75198
published_at 2026-04-08T12:55:00Z
4
value 0.00871
scoring_system epss
scoring_elements 0.7521
published_at 2026-04-09T12:55:00Z
5
value 0.0091
scoring_system epss
scoring_elements 0.75838
published_at 2026-04-11T12:55:00Z
6
value 0.0091
scoring_system epss
scoring_elements 0.75819
published_at 2026-04-12T12:55:00Z
7
value 0.01047
scoring_system epss
scoring_elements 0.77501
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14174
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2421824
reference_id 2421824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2421824
5
reference_url https://issues.chromium.org/issues/466192044
reference_id 466192044
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/
url https://issues.chromium.org/issues/466192044
6
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
7
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
8
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
9
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
10
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
11
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
12
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
13
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
14
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
15
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
16
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
17
reference_url https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html
reference_id stable-channel-update-for-desktop_10.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/
url https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html
18
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-14174
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jyw2-fu8s-3fha
66
url VCID-kdvu-rhgt-xqat
vulnerability_id VCID-kdvu-rhgt-xqat
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24223
reference_id
reference_type
scores
0
value 0.0023
scoring_system epss
scoring_elements 0.45855
published_at 2026-04-13T12:55:00Z
1
value 0.0023
scoring_system epss
scoring_elements 0.45831
published_at 2026-04-02T12:55:00Z
2
value 0.0023
scoring_system epss
scoring_elements 0.45853
published_at 2026-04-04T12:55:00Z
3
value 0.0023
scoring_system epss
scoring_elements 0.45803
published_at 2026-04-07T12:55:00Z
4
value 0.0023
scoring_system epss
scoring_elements 0.45859
published_at 2026-04-08T12:55:00Z
5
value 0.0023
scoring_system epss
scoring_elements 0.45856
published_at 2026-04-09T12:55:00Z
6
value 0.0023
scoring_system epss
scoring_elements 0.45878
published_at 2026-04-11T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.45848
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24223
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366499
reference_id 2366499
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366499
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24223
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdvu-rhgt-xqat
67
url VCID-kp4m-h6ua-h7dm
vulnerability_id VCID-kp4m-h6ua-h7dm
summary webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40776
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57349
published_at 2026-04-13T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59363
published_at 2026-04-11T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59344
published_at 2026-04-09T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.5933
published_at 2026-04-08T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59316
published_at 2026-04-04T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.5928
published_at 2026-04-07T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59346
published_at 2026-04-12T12:55:00Z
7
value 0.00441
scoring_system epss
scoring_elements 0.63204
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2301841
reference_id 2301841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2301841
19
reference_url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
reference_id apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
20
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214116
21
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214117
22
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214119
23
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214121
24
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214122
25
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214123
26
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214124
27
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
31
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
32
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
33
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
34
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-40776
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kp4m-h6ua-h7dm
68
url VCID-ksq5-ygcp-nbaz
vulnerability_id VCID-ksq5-ygcp-nbaz
summary webkitgtk: A malicious website may exfiltrate data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31205
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37915
published_at 2026-04-13T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37994
published_at 2026-04-02T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.38019
published_at 2026-04-04T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.37898
published_at 2026-04-07T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37949
published_at 2026-04-08T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37961
published_at 2026-04-09T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.37978
published_at 2026-04-11T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.3794
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31205
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366501
reference_id 2366501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366501
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://access.redhat.com/errata/RHSA-2025:7995
reference_id RHSA-2025:7995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7995
17
reference_url https://access.redhat.com/errata/RHSA-2025:8046
reference_id RHSA-2025:8046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8046
18
reference_url https://access.redhat.com/errata/RHSA-2025:8530
reference_id RHSA-2025:8530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8530
19
reference_url https://access.redhat.com/errata/RHSA-2025:8532
reference_id RHSA-2025:8532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8532
20
reference_url https://access.redhat.com/errata/RHSA-2025:8533
reference_id RHSA-2025:8533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8533
21
reference_url https://access.redhat.com/errata/RHSA-2025:8534
reference_id RHSA-2025:8534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8534
22
reference_url https://access.redhat.com/errata/RHSA-2025:8541
reference_id RHSA-2025:8541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8541
23
reference_url https://access.redhat.com/errata/RHSA-2025:8600
reference_id RHSA-2025:8600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8600
24
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31205
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksq5-ygcp-nbaz
69
url VCID-kuyh-x3z4-q7gf
vulnerability_id VCID-kuyh-x3z4-q7gf
summary webkit: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54505
reference_id
reference_type
scores
0
value 0.00587
scoring_system epss
scoring_elements 0.69106
published_at 2026-04-13T12:55:00Z
1
value 0.00587
scoring_system epss
scoring_elements 0.69058
published_at 2026-04-02T12:55:00Z
2
value 0.00587
scoring_system epss
scoring_elements 0.69079
published_at 2026-04-04T12:55:00Z
3
value 0.00587
scoring_system epss
scoring_elements 0.6906
published_at 2026-04-07T12:55:00Z
4
value 0.00587
scoring_system epss
scoring_elements 0.6911
published_at 2026-04-08T12:55:00Z
5
value 0.00587
scoring_system epss
scoring_elements 0.69129
published_at 2026-04-09T12:55:00Z
6
value 0.00587
scoring_system epss
scoring_elements 0.69152
published_at 2026-04-11T12:55:00Z
7
value 0.00587
scoring_system epss
scoring_elements 0.69136
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54505
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121838
reference_id 121838
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121838
6
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121839
7
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121843
8
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121844
9
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121845
10
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121846
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333844
reference_id 2333844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333844
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-54505
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kuyh-x3z4-q7gf
70
url VCID-kx6w-wbua-5ffr
vulnerability_id VCID-kx6w-wbua-5ffr
summary webkitgtk: A website may be able to access sensor information without user consent
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43356
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15335
published_at 2026-04-04T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15278
published_at 2026-04-09T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15227
published_at 2026-04-08T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15139
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16805
published_at 2026-04-02T12:55:00Z
5
value 0.00056
scoring_system epss
scoring_elements 0.17611
published_at 2026-04-13T12:55:00Z
6
value 0.00056
scoring_system epss
scoring_elements 0.17708
published_at 2026-04-11T12:55:00Z
7
value 0.00056
scoring_system epss
scoring_elements 0.17662
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43356
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125109
reference_id 125109
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125109
6
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125113
7
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125114
8
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125115
9
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125116
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397628
reference_id 2397628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397628
11
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
12
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
13
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
14
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
15
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
16
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
17
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
18
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
19
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
20
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
21
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
22
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43356
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kx6w-wbua-5ffr
71
url VCID-ky87-8zpf-nqg2
vulnerability_id VCID-ky87-8zpf-nqg2
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30427
reference_id
reference_type
scores
0
value 0.01119
scoring_system epss
scoring_elements 0.78181
published_at 2026-04-02T12:55:00Z
1
value 0.01119
scoring_system epss
scoring_elements 0.7823
published_at 2026-04-13T12:55:00Z
2
value 0.01119
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-04T12:55:00Z
3
value 0.01119
scoring_system epss
scoring_elements 0.78194
published_at 2026-04-07T12:55:00Z
4
value 0.01119
scoring_system epss
scoring_elements 0.7822
published_at 2026-04-08T12:55:00Z
5
value 0.01119
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-09T12:55:00Z
6
value 0.01119
scoring_system epss
scoring_elements 0.78252
published_at 2026-04-11T12:55:00Z
7
value 0.01119
scoring_system epss
scoring_elements 0.78234
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357919
reference_id 2357919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357919
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-30427
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ky87-8zpf-nqg2
72
url VCID-m59e-8bgm-77he
vulnerability_id VCID-m59e-8bgm-77he
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43343
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.35109
published_at 2026-04-04T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-02T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35061
published_at 2026-04-09T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35033
published_at 2026-04-08T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.34988
published_at 2026-04-07T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37917
published_at 2026-04-13T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.3798
published_at 2026-04-11T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.37942
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125110
reference_id 125110
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125110
6
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125113
7
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125114
8
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125115
9
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125116
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403598
reference_id 2403598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403598
11
reference_url https://access.redhat.com/errata/RHSA-2025:18070
reference_id RHSA-2025:18070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18070
12
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
13
reference_url https://access.redhat.com/errata/RHSA-2025:19913
reference_id RHSA-2025:19913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19913
14
reference_url https://access.redhat.com/errata/RHSA-2025:19914
reference_id RHSA-2025:19914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19914
15
reference_url https://access.redhat.com/errata/RHSA-2025:19915
reference_id RHSA-2025:19915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19915
16
reference_url https://access.redhat.com/errata/RHSA-2025:19916
reference_id RHSA-2025:19916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19916
17
reference_url https://access.redhat.com/errata/RHSA-2025:19918
reference_id RHSA-2025:19918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19918
18
reference_url https://access.redhat.com/errata/RHSA-2025:19919
reference_id RHSA-2025:19919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19919
19
reference_url https://access.redhat.com/errata/RHSA-2025:19920
reference_id RHSA-2025:19920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19920
20
reference_url https://access.redhat.com/errata/RHSA-2025:19946
reference_id RHSA-2025:19946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19946
21
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
22
reference_url https://usn.ubuntu.com/7895-1/
reference_id USN-7895-1
reference_type
scores
url https://usn.ubuntu.com/7895-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43343
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m59e-8bgm-77he
73
url VCID-mch4-qacj-f7ey
vulnerability_id VCID-mch4-qacj-f7ey
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44192
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40741
published_at 2026-04-11T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40715
published_at 2026-04-02T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40717
published_at 2026-04-08T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40667
published_at 2026-04-07T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40743
published_at 2026-04-04T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40723
published_at 2026-04-09T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43342
published_at 2026-04-13T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43358
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353871
reference_id 2353871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353871
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44192
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mch4-qacj-f7ey
74
url VCID-mfg4-2ma4-3qgj
vulnerability_id VCID-mfg4-2ma4-3qgj
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43434
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10647
published_at 2026-04-13T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10558
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1063
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10689
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10703
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10671
published_at 2026-04-12T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416335
reference_id 2416335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416335
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43434
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfg4-2ma4-3qgj
75
url VCID-mhfm-j5xm-wybd
vulnerability_id VCID-mhfm-j5xm-wybd
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43431
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.12942
published_at 2026-04-13T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13133
published_at 2026-04-04T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.12936
published_at 2026-04-07T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13015
published_at 2026-04-08T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13065
published_at 2026-04-09T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13027
published_at 2026-04-11T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.12988
published_at 2026-04-12T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13656
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43431
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416332
reference_id 2416332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416332
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43431
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mhfm-j5xm-wybd
76
url VCID-mmcp-4qnx-5ufh
vulnerability_id VCID-mmcp-4qnx-5ufh
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20635
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15424
published_at 2026-04-02T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15291
published_at 2026-04-13T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15493
published_at 2026-04-04T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15297
published_at 2026-04-07T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15385
published_at 2026-04-08T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15435
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15396
published_at 2026-04-11T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15357
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126351
reference_id 126351
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126351
8
reference_url https://support.apple.com/en-us/126352
reference_id 126352
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126352
9
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126353
10
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126354
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448790
reference_id 2448790
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448790
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
1
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20635
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mmcp-4qnx-5ufh
77
url VCID-mu71-qcsx-33fj
vulnerability_id VCID-mu71-qcsx-33fj
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42950.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42950
reference_id
reference_type
scores
0
value 0.00645
scoring_system epss
scoring_elements 0.70623
published_at 2026-04-02T12:55:00Z
1
value 0.00645
scoring_system epss
scoring_elements 0.70672
published_at 2026-04-13T12:55:00Z
2
value 0.00645
scoring_system epss
scoring_elements 0.70639
published_at 2026-04-04T12:55:00Z
3
value 0.00645
scoring_system epss
scoring_elements 0.70616
published_at 2026-04-07T12:55:00Z
4
value 0.00645
scoring_system epss
scoring_elements 0.70661
published_at 2026-04-08T12:55:00Z
5
value 0.00645
scoring_system epss
scoring_elements 0.70677
published_at 2026-04-09T12:55:00Z
6
value 0.00645
scoring_system epss
scoring_elements 0.707
published_at 2026-04-11T12:55:00Z
7
value 0.00645
scoring_system epss
scoring_elements 0.70685
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271718
reference_id 2271718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271718
14
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
15
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214035
16
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214036
17
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214039
18
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/kb/HT214039
19
reference_url https://support.apple.com/en-us/HT214040
reference_id HT214040
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214040
20
reference_url https://support.apple.com/en-us/HT214041
reference_id HT214041
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214041
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
22
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
23
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2023-42950
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mu71-qcsx-33fj
78
url VCID-n7w5-dz8n-mbht
vulnerability_id VCID-n7w5-dz8n-mbht
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44244
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51323
published_at 2026-04-13T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51277
published_at 2026-04-02T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51302
published_at 2026-04-04T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51262
published_at 2026-04-07T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-08T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51314
published_at 2026-04-09T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51357
published_at 2026-04-11T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51336
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121563
reference_id 121563
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121563
5
reference_url https://support.apple.com/en-us/121564
reference_id 121564
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121564
6
reference_url https://support.apple.com/en-us/121565
reference_id 121565
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121565
7
reference_url https://support.apple.com/en-us/121566
reference_id 121566
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121566
8
reference_url https://support.apple.com/en-us/121569
reference_id 121569
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121569
9
reference_url https://support.apple.com/en-us/121571
reference_id 121571
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121571
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323278
reference_id 2323278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323278
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:9545
reference_id RHSA-2024:9545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9545
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2024:9637
reference_id RHSA-2024:9637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9637
16
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7113-1/
reference_id USN-7113-1
reference_type
scores
url https://usn.ubuntu.com/7113-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44244
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w5-dz8n-mbht
79
url VCID-nmvc-maj7-rfhm
vulnerability_id VCID-nmvc-maj7-rfhm
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43536
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18813
published_at 2026-04-02T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.1863
published_at 2026-04-13T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18866
published_at 2026-04-04T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18588
published_at 2026-04-07T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18667
published_at 2026-04-08T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18723
published_at 2026-04-09T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18728
published_at 2026-04-11T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.18681
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43536
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125892
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423190
reference_id 2423190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423190
9
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
10
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
11
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
12
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
13
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
14
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
15
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
16
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
17
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
18
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
19
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
20
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43536
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmvc-maj7-rfhm
80
url VCID-nu9v-3xak-77aw
vulnerability_id VCID-nu9v-3xak-77aw
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43240
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08273
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09114
published_at 2026-04-13T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0913
published_at 2026-04-08T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.0905
published_at 2026-04-07T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09161
published_at 2026-04-11T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09128
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/
url https://support.apple.com/en-us/124149
5
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/
url https://support.apple.com/en-us/124152
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2384385
reference_id 2384385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2384385
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
9
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
10
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
11
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
12
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
13
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
14
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
15
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
16
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
17
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
18
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43240
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nu9v-3xak-77aw
81
url VCID-p84d-5ze6-9fb5
vulnerability_id VCID-p84d-5ze6-9fb5
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43228
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.1092
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12046
published_at 2026-04-13T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.11971
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12053
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12105
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12112
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12075
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.1217
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43228
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/
url https://support.apple.com/en-us/124152
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386275
reference_id 2386275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386275
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43228
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p84d-5ze6-9fb5
82
url VCID-pg5b-3vcj-7bav
vulnerability_id VCID-pg5b-3vcj-7bav
summary webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27851
reference_id
reference_type
scores
0
value 0.00982
scoring_system epss
scoring_elements 0.76783
published_at 2026-04-13T12:55:00Z
1
value 0.00982
scoring_system epss
scoring_elements 0.76758
published_at 2026-04-04T12:55:00Z
2
value 0.00982
scoring_system epss
scoring_elements 0.7674
published_at 2026-04-07T12:55:00Z
3
value 0.00982
scoring_system epss
scoring_elements 0.76771
published_at 2026-04-08T12:55:00Z
4
value 0.00982
scoring_system epss
scoring_elements 0.76782
published_at 2026-04-09T12:55:00Z
5
value 0.00982
scoring_system epss
scoring_elements 0.7681
published_at 2026-04-11T12:55:00Z
6
value 0.00982
scoring_system epss
scoring_elements 0.7679
published_at 2026-04-12T12:55:00Z
7
value 0.01303
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27851
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120896
5
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120901
6
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120902
7
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120903
8
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120905
9
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120906
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314704
reference_id 2314704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314704
11
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
12
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214101
13
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214102
14
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214103
15
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214104
16
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214106
17
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214108
18
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
19
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
22
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
23
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
24
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
25
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-27851
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5b-3vcj-7bav
83
url VCID-ph63-r178-pfgg
vulnerability_id VCID-ph63-r178-pfgg
summary webkitgtk: webkitgtk: Use-after-free due to improper memory management
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43529
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31831
published_at 2026-04-04T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31787
published_at 2026-04-02T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31731
published_at 2026-04-09T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31702
published_at 2026-04-08T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.3165
published_at 2026-04-07T12:55:00Z
5
value 0.00152
scoring_system epss
scoring_elements 0.35872
published_at 2026-04-13T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35936
published_at 2026-04-11T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35896
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125889
reference_id 125889
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125889
8
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125890
9
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125891
10
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125892
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423166
reference_id 2423166
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423166
12
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
13
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
14
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
15
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
16
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
17
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
18
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
19
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
20
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
21
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
22
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
23
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43529
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph63-r178-pfgg
84
url VCID-pwqw-z8jj-abfs
vulnerability_id VCID-pwqw-z8jj-abfs
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43440
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12099
published_at 2026-04-13T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12226
published_at 2026-04-04T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12027
published_at 2026-04-07T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12109
published_at 2026-04-08T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12161
published_at 2026-04-09T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12168
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12131
published_at 2026-04-12T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.13044
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416336
reference_id 2416336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416336
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43440
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwqw-z8jj-abfs
85
url VCID-pyek-9fpp-nudy
vulnerability_id VCID-pyek-9fpp-nudy
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40866
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25506
published_at 2026-04-13T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25472
published_at 2026-04-07T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25546
published_at 2026-04-08T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25594
published_at 2026-04-09T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25604
published_at 2026-04-11T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25563
published_at 2026-04-12T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25663
published_at 2026-04-02T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25704
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40866
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/
url https://support.apple.com/en-us/121241
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2312724
reference_id 2312724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2312724
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
9
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
10
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://usn.ubuntu.com/7079-1/
reference_id USN-7079-1
reference_type
scores
url https://usn.ubuntu.com/7079-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-40866
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyek-9fpp-nudy
86
url VCID-q3jv-e392-5fef
vulnerability_id VCID-q3jv-e392-5fef
summary webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40780
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25195
published_at 2026-04-13T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26649
published_at 2026-04-11T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26644
published_at 2026-04-09T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26594
published_at 2026-04-08T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26741
published_at 2026-04-04T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26526
published_at 2026-04-07T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26604
published_at 2026-04-12T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26699
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40780
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2302069
reference_id 2302069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2302069
19
reference_url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
reference_id apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
20
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214116
21
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214117
22
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214119
23
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214121
24
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214122
25
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214123
26
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214124
27
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
31
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
32
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
33
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
34
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
35
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
36
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-40780
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q3jv-e392-5fef
87
url VCID-qvy2-8161-eycu
vulnerability_id VCID-qvy2-8161-eycu
summary webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40782
reference_id
reference_type
scores
0
value 0.00389
scoring_system epss
scoring_elements 0.6002
published_at 2026-04-13T12:55:00Z
1
value 0.00423
scoring_system epss
scoring_elements 0.62134
published_at 2026-04-12T12:55:00Z
2
value 0.00423
scoring_system epss
scoring_elements 0.62144
published_at 2026-04-11T12:55:00Z
3
value 0.00423
scoring_system epss
scoring_elements 0.62125
published_at 2026-04-09T12:55:00Z
4
value 0.00423
scoring_system epss
scoring_elements 0.62107
published_at 2026-04-08T12:55:00Z
5
value 0.00423
scoring_system epss
scoring_elements 0.62057
published_at 2026-04-07T12:55:00Z
6
value 0.00423
scoring_system epss
scoring_elements 0.62088
published_at 2026-04-04T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.63402
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2302071
reference_id 2302071
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2302071
19
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214116
20
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214117
21
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214119
22
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214121
23
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214122
24
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214123
25
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214124
26
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
27
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
28
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
29
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
30
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
31
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
32
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
33
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-40782
risk_score 3.9
exploitability 0.5
weighted_severity 7.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qvy2-8161-eycu
88
url VCID-qytm-81jk-muhc
vulnerability_id VCID-qytm-81jk-muhc
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43432
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10285
published_at 2026-04-13T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10283
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10179
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10253
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10315
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10345
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10304
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10752
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43432
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416334
reference_id 2416334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416334
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43432
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qytm-81jk-muhc
89
url VCID-r857-ke39-xug8
vulnerability_id VCID-r857-ke39-xug8
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43227
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32854
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34644
published_at 2026-04-13T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34755
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34632
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34676
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34704
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34707
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34668
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43227
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386274
reference_id 2386274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386274
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43227
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r857-ke39-xug8
90
url VCID-rj9q-8rw3-qbbn
vulnerability_id VCID-rj9q-8rw3-qbbn
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24264
reference_id
reference_type
scores
0
value 0.01384
scoring_system epss
scoring_elements 0.80265
published_at 2026-04-02T12:55:00Z
1
value 0.01384
scoring_system epss
scoring_elements 0.8031
published_at 2026-04-13T12:55:00Z
2
value 0.01384
scoring_system epss
scoring_elements 0.80286
published_at 2026-04-04T12:55:00Z
3
value 0.01384
scoring_system epss
scoring_elements 0.80274
published_at 2026-04-07T12:55:00Z
4
value 0.01384
scoring_system epss
scoring_elements 0.80302
published_at 2026-04-08T12:55:00Z
5
value 0.01384
scoring_system epss
scoring_elements 0.80313
published_at 2026-04-09T12:55:00Z
6
value 0.01384
scoring_system epss
scoring_elements 0.80331
published_at 2026-04-11T12:55:00Z
7
value 0.01384
scoring_system epss
scoring_elements 0.80316
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24264
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357918
reference_id 2357918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357918
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
13
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
14
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
15
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
16
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
17
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24264
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9q-8rw3-qbbn
91
url VCID-stjs-xknd-zfgh
vulnerability_id VCID-stjs-xknd-zfgh
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-66287
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21677
published_at 2026-04-04T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21619
published_at 2026-04-02T12:55:00Z
2
value 0.001
scoring_system epss
scoring_elements 0.27617
published_at 2026-04-13T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27604
published_at 2026-04-07T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27671
published_at 2026-04-08T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27714
published_at 2026-04-09T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27719
published_at 2026-04-11T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27675
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-66287
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418857
reference_id 2418857
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2418857
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
22
reference_url https://access.redhat.com/security/cve/CVE-2025-66287
reference_id CVE-2025-66287
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/security/cve/CVE-2025-66287
23
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:22789
24
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:22790
25
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23110
26
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23433
27
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23434
28
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23451
29
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23452
30
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23583
31
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23591
32
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23742
33
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23743
34
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
35
reference_url https://webkitgtk.org/security/WSA-2025-0009.html
reference_id WSA-2025-0009.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://webkitgtk.org/security/WSA-2025-0009.html
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-66287
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stjs-xknd-zfgh
92
url VCID-t46t-rhgu-cbc1
vulnerability_id VCID-t46t-rhgu-cbc1
summary webkitgtk: A website may be able to track users through Safari web extensions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20676
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-13T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10683
published_at 2026-04-02T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-04T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10606
published_at 2026-04-07T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10679
published_at 2026-04-08T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10735
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10749
published_at 2026-04-11T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10718
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20676
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126348
6
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126353
7
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126354
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448794
reference_id 2448794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448794
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
1
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20676
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t46t-rhgu-cbc1
93
url VCID-tqb3-nabh-tkeh
vulnerability_id VCID-tqb3-nabh-tkeh
summary webkitgtk: data isolation bypass vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44309
reference_id
reference_type
scores
0
value 0.01158
scoring_system epss
scoring_elements 0.78526
published_at 2026-04-02T12:55:00Z
1
value 0.01274
scoring_system epss
scoring_elements 0.79532
published_at 2026-04-13T12:55:00Z
2
value 0.01274
scoring_system epss
scoring_elements 0.79513
published_at 2026-04-04T12:55:00Z
3
value 0.01274
scoring_system epss
scoring_elements 0.79499
published_at 2026-04-07T12:55:00Z
4
value 0.01274
scoring_system epss
scoring_elements 0.79527
published_at 2026-04-08T12:55:00Z
5
value 0.01274
scoring_system epss
scoring_elements 0.79535
published_at 2026-04-09T12:55:00Z
6
value 0.01274
scoring_system epss
scoring_elements 0.79557
published_at 2026-04-11T12:55:00Z
7
value 0.01274
scoring_system epss
scoring_elements 0.7954
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121752
reference_id 121752
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121752
5
reference_url https://support.apple.com/en-us/121753
reference_id 121753
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121753
6
reference_url https://support.apple.com/en-us/121754
reference_id 121754
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121754
7
reference_url https://support.apple.com/en-us/121755
reference_id 121755
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121755
8
reference_url https://support.apple.com/en-us/121756
reference_id 121756
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121756
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327927
reference_id 2327927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327927
10
reference_url https://access.redhat.com/errata/RHSA-2024:10472
reference_id RHSA-2024:10472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10472
11
reference_url https://access.redhat.com/errata/RHSA-2024:10480
reference_id RHSA-2024:10480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10480
12
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
13
reference_url https://access.redhat.com/errata/RHSA-2024:10482
reference_id RHSA-2024:10482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10482
14
reference_url https://access.redhat.com/errata/RHSA-2024:10483
reference_id RHSA-2024:10483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10483
15
reference_url https://access.redhat.com/errata/RHSA-2024:10489
reference_id RHSA-2024:10489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10489
16
reference_url https://access.redhat.com/errata/RHSA-2024:10492
reference_id RHSA-2024:10492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10492
17
reference_url https://access.redhat.com/errata/RHSA-2024:10496
reference_id RHSA-2024:10496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10496
18
reference_url https://access.redhat.com/errata/RHSA-2024:10501
reference_id RHSA-2024:10501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10501
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/7142-1/
reference_id USN-7142-1
reference_type
scores
url https://usn.ubuntu.com/7142-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2024-44309
risk_score 10.0
exploitability 2.0
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqb3-nabh-tkeh
94
url VCID-u1sp-38g8-xfan
vulnerability_id VCID-u1sp-38g8-xfan
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4558
reference_id
reference_type
scores
0
value 0.0238
scoring_system epss
scoring_elements 0.84992
published_at 2026-04-13T12:55:00Z
1
value 0.02579
scoring_system epss
scoring_elements 0.85554
published_at 2026-04-09T12:55:00Z
2
value 0.02579
scoring_system epss
scoring_elements 0.85566
published_at 2026-04-12T12:55:00Z
3
value 0.02579
scoring_system epss
scoring_elements 0.85568
published_at 2026-04-11T12:55:00Z
4
value 0.02579
scoring_system epss
scoring_elements 0.85503
published_at 2026-04-02T12:55:00Z
5
value 0.02579
scoring_system epss
scoring_elements 0.85519
published_at 2026-04-04T12:55:00Z
6
value 0.02579
scoring_system epss
scoring_elements 0.85524
published_at 2026-04-07T12:55:00Z
7
value 0.02579
scoring_system epss
scoring_elements 0.85544
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558
3
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
4
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
5
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2279689
reference_id 2279689
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2279689
7
reference_url https://issues.chromium.org/issues/337766133
reference_id 337766133
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://issues.chromium.org/issues/337766133
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/
reference_id 6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/
reference_id BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/
reference_id FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/
11
reference_url https://security.gentoo.org/glsa/202412-05
reference_id GLSA-202412-05
reference_type
scores
url https://security.gentoo.org/glsa/202412-05
12
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/
reference_id IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/
reference_id LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/
15
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
16
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
17
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
18
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
19
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
20
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
21
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
22
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
23
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html
reference_id stable-channel-update-for-desktop_7.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html
26
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-4558
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u1sp-38g8-xfan
95
url VCID-u6k6-1hmc-tfaf
vulnerability_id VCID-u6k6-1hmc-tfaf
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43427
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19484
published_at 2026-04-13T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19732
published_at 2026-04-04T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19456
published_at 2026-04-07T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19535
published_at 2026-04-08T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19587
published_at 2026-04-09T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.1959
published_at 2026-04-11T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19542
published_at 2026-04-12T12:55:00Z
7
value 0.00065
scoring_system epss
scoring_elements 0.20366
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125640
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416329
reference_id 2416329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416329
10
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
11
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
12
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
13
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
14
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
15
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
16
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
17
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
18
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
19
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
20
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
21
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43427
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u6k6-1hmc-tfaf
96
url VCID-u9g4-5f16-yqc9
vulnerability_id VCID-u9g4-5f16-yqc9
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24209
reference_id
reference_type
scores
0
value 0.02557
scoring_system epss
scoring_elements 0.85507
published_at 2026-04-13T12:55:00Z
1
value 0.02557
scoring_system epss
scoring_elements 0.85465
published_at 2026-04-04T12:55:00Z
2
value 0.02557
scoring_system epss
scoring_elements 0.85468
published_at 2026-04-07T12:55:00Z
3
value 0.02557
scoring_system epss
scoring_elements 0.85489
published_at 2026-04-08T12:55:00Z
4
value 0.02557
scoring_system epss
scoring_elements 0.85497
published_at 2026-04-09T12:55:00Z
5
value 0.02557
scoring_system epss
scoring_elements 0.85512
published_at 2026-04-11T12:55:00Z
6
value 0.02557
scoring_system epss
scoring_elements 0.8551
published_at 2026-04-12T12:55:00Z
7
value 0.03379
scoring_system epss
scoring_elements 0.87339
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122376
reference_id 122376
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122376
8
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122377
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357911
reference_id 2357911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357911
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24209
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9g4-5f16-yqc9
97
url VCID-unu1-sbnm-27bf
vulnerability_id VCID-unu1-sbnm-27bf
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43433
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.12942
published_at 2026-04-13T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13133
published_at 2026-04-04T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.12936
published_at 2026-04-07T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13015
published_at 2026-04-08T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13065
published_at 2026-04-09T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13027
published_at 2026-04-11T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.12988
published_at 2026-04-12T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.14014
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43433
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448783
reference_id 2448783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448783
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43433
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unu1-sbnm-27bf
98
url VCID-v1he-6exf-b7dt
vulnerability_id VCID-v1he-6exf-b7dt
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27820
reference_id
reference_type
scores
0
value 0.01283
scoring_system epss
scoring_elements 0.79595
published_at 2026-04-13T12:55:00Z
1
value 0.01283
scoring_system epss
scoring_elements 0.79574
published_at 2026-04-04T12:55:00Z
2
value 0.01283
scoring_system epss
scoring_elements 0.79562
published_at 2026-04-07T12:55:00Z
3
value 0.01283
scoring_system epss
scoring_elements 0.7959
published_at 2026-04-08T12:55:00Z
4
value 0.01283
scoring_system epss
scoring_elements 0.79597
published_at 2026-04-09T12:55:00Z
5
value 0.01283
scoring_system epss
scoring_elements 0.79618
published_at 2026-04-11T12:55:00Z
6
value 0.01283
scoring_system epss
scoring_elements 0.79603
published_at 2026-04-12T12:55:00Z
7
value 0.01303
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27820
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120898
9
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120901
10
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120902
11
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120903
12
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120905
13
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120906
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314698
reference_id 2314698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314698
15
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
16
reference_url https://support.apple.com/en-us/HT214100
reference_id HT214100
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214100
17
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214101
18
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214102
19
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214103
20
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214104
21
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214106
22
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214108
23
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
24
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
25
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
26
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
27
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
28
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
29
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
30
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
31
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-27820
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v1he-6exf-b7dt
99
url VCID-v937-hkz6-v3hc
vulnerability_id VCID-v937-hkz6-v3hc
summary webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to a cross site scripting attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40785.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40785.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40785
reference_id
reference_type
scores
0
value 0.00635
scoring_system epss
scoring_elements 0.70359
published_at 2026-04-02T12:55:00Z
1
value 0.00637
scoring_system epss
scoring_elements 0.70494
published_at 2026-04-12T12:55:00Z
2
value 0.00637
scoring_system epss
scoring_elements 0.70509
published_at 2026-04-11T12:55:00Z
3
value 0.00637
scoring_system epss
scoring_elements 0.70485
published_at 2026-04-09T12:55:00Z
4
value 0.00637
scoring_system epss
scoring_elements 0.70424
published_at 2026-04-07T12:55:00Z
5
value 0.00637
scoring_system epss
scoring_elements 0.70446
published_at 2026-04-04T12:55:00Z
6
value 0.00637
scoring_system epss
scoring_elements 0.7047
published_at 2026-04-08T12:55:00Z
7
value 0.00637
scoring_system epss
scoring_elements 0.7048
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40785
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40785
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40785
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2302068
reference_id 2302068
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2302068
19
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/HT214116
20
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/HT214117
21
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/HT214119
22
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/HT214121
23
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/HT214122
24
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/HT214123
25
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T14:53:29Z/
url https://support.apple.com/en-us/HT214124
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-40785
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v937-hkz6-v3hc
100
url VCID-vk4e-qufz-5ffp
vulnerability_id VCID-vk4e-qufz-5ffp
summary angle: insufficient input validation can cause undefined behavior
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6558
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37959
published_at 2026-04-13T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37993
published_at 2026-04-08T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.38004
published_at 2026-04-09T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.38021
published_at 2026-04-11T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37984
published_at 2026-04-12T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44447
published_at 2026-04-04T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44381
published_at 2026-04-07T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44426
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2380254
reference_id 2380254
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2380254
5
reference_url https://issues.chromium.org/issues/427162086
reference_id 427162086
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/
url https://issues.chromium.org/issues/427162086
6
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
7
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
8
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
9
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
10
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
11
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
12
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
13
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
14
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
15
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
16
reference_url https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/
url https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html
17
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-6558
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vk4e-qufz-5ffp
101
url VCID-vqd7-gwyv-vfaf
vulnerability_id VCID-vqd7-gwyv-vfaf
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23254.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23254.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23254
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64466
published_at 2026-04-13T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64494
published_at 2026-04-12T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64506
published_at 2026-04-11T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.6449
published_at 2026-04-09T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64474
published_at 2026-04-08T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64426
published_at 2026-04-07T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64467
published_at 2026-04-04T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66263
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23254
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120881
14
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120882
15
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120883
16
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120893
17
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120894
18
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120895
19
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270289
reference_id 2270289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270289
21
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
22
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
23
reference_url http://seclists.org/fulldisclosure/2024/Mar/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/26
24
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
25
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214081
26
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214084
27
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214086
28
reference_url https://support.apple.com/en-us/HT214087
reference_id HT214087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214087
29
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214088
30
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214089
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
32
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
33
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-23254
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqd7-gwyv-vfaf
102
url VCID-w3r3-11kt-2ydu
vulnerability_id VCID-w3r3-11kt-2ydu
summary webkitgtk: A website may exfiltrate image data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43392
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08627
published_at 2026-04-13T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08649
published_at 2026-04-04T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08567
published_at 2026-04-07T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.0864
published_at 2026-04-08T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08664
published_at 2026-04-09T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08662
published_at 2026-04-11T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08639
published_at 2026-04-12T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08987
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416325
reference_id 2416325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416325
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43392
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w3r3-11kt-2ydu
103
url VCID-w5gq-k53s-tuc5
vulnerability_id VCID-w5gq-k53s-tuc5
summary webkitgtk: A remote attacker may be able to cause a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20652
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.38025
published_at 2026-04-02T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37947
published_at 2026-04-13T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.38051
published_at 2026-04-04T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.3793
published_at 2026-04-07T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37981
published_at 2026-04-08T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37992
published_at 2026-04-09T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.38009
published_at 2026-04-11T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.37972
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20652
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126353
8
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126354
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448793
reference_id 2448793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448793
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
1
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20652
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w5gq-k53s-tuc5
104
url VCID-wbn4-ea3w-k7f3
vulnerability_id VCID-wbn4-ea3w-k7f3
summary webkitgtk: Processing web content may lead to a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24158
reference_id
reference_type
scores
0
value 0.0086
scoring_system epss
scoring_elements 0.74985
published_at 2026-04-02T12:55:00Z
1
value 0.0086
scoring_system epss
scoring_elements 0.75025
published_at 2026-04-13T12:55:00Z
2
value 0.0086
scoring_system epss
scoring_elements 0.75014
published_at 2026-04-04T12:55:00Z
3
value 0.0086
scoring_system epss
scoring_elements 0.7499
published_at 2026-04-07T12:55:00Z
4
value 0.0086
scoring_system epss
scoring_elements 0.75024
published_at 2026-04-08T12:55:00Z
5
value 0.0086
scoring_system epss
scoring_elements 0.75036
published_at 2026-04-12T12:55:00Z
6
value 0.0086
scoring_system epss
scoring_elements 0.75057
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122071
reference_id 122071
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122071
7
reference_url https://support.apple.com/en-us/122072
reference_id 122072
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122072
8
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122073
9
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122074
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344623
reference_id 2344623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344623
11
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
14
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-24158
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbn4-ea3w-k7f3
105
url VCID-whma-xbxr-5uay
vulnerability_id VCID-whma-xbxr-5uay
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43342
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52355
published_at 2026-04-04T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.52326
published_at 2026-04-02T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52366
published_at 2026-04-09T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.5237
published_at 2026-04-08T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52317
published_at 2026-04-07T12:55:00Z
5
value 0.00332
scoring_system epss
scoring_elements 0.56087
published_at 2026-04-13T12:55:00Z
6
value 0.00332
scoring_system epss
scoring_elements 0.56127
published_at 2026-04-11T12:55:00Z
7
value 0.00332
scoring_system epss
scoring_elements 0.56104
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43342
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125109
reference_id 125109
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125109
6
reference_url https://support.apple.com/en-us/125110
reference_id 125110
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125110
7
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125113
8
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125114
9
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125115
10
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125116
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397627
reference_id 2397627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397627
12
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
13
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
14
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
15
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
16
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
17
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
18
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
19
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
20
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
21
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
22
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
23
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43342
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whma-xbxr-5uay
106
url VCID-wn9z-vusf-yycn
vulnerability_id VCID-wn9z-vusf-yycn
summary webkitgtk: processing a malicious image may lead to a denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42883.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42883
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05938
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.06004
published_at 2026-04-13T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.0597
published_at 2026-04-04T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05954
published_at 2026-04-07T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05993
published_at 2026-04-08T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.06031
published_at 2026-04-09T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.06021
published_at 2026-04-11T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.06013
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42883
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2023/12/18/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://www.openwall.com/lists/oss-security/2023/12/18/1
5
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254326
reference_id 2254326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254326
8
reference_url http://seclists.org/fulldisclosure/2023/Dec/6
reference_id 6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/6
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/7
10
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/9
12
reference_url https://www.debian.org/security/2023/dsa-5580
reference_id dsa-5580
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://www.debian.org/security/2023/dsa-5580
13
reference_url https://support.apple.com/en-us/HT214034
reference_id HT214034
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214034
14
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/kb/HT214034
15
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214035
16
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214036
17
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214039
18
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/kb/HT214039
19
reference_url https://support.apple.com/en-us/HT214040
reference_id HT214040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214040
20
reference_url https://support.apple.com/en-us/HT214041
reference_id HT214041
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214041
21
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
22
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/6582-1/
reference_id USN-6582-1
reference_type
scores
url https://usn.ubuntu.com/6582-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2023-42883
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wn9z-vusf-yycn
107
url VCID-wnxh-854z-ykfk
vulnerability_id VCID-wnxh-854z-ykfk
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43211
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05046
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04925
published_at 2026-04-13T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.0491
published_at 2026-04-04T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.04929
published_at 2026-04-07T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.04965
published_at 2026-04-08T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04981
published_at 2026-04-09T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.04963
published_at 2026-04-11T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386270
reference_id 2386270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386270
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43211
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxh-854z-ykfk
108
url VCID-wrt4-z8ne-zffm
vulnerability_id VCID-wrt4-z8ne-zffm
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43457
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08959
published_at 2026-04-13T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08968
published_at 2026-04-04T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08899
published_at 2026-04-07T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.08977
published_at 2026-04-08T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.09009
published_at 2026-04-11T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08972
published_at 2026-04-12T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09336
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43457
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125638
7
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125639
8
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125640
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448786
reference_id 2448786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448786
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
1
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2025-43457
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrt4-z8ne-zffm
109
url VCID-x5sh-5xtn-r7cp
vulnerability_id VCID-x5sh-5xtn-r7cp
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43214
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.3515
published_at 2026-04-02T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.3696
published_at 2026-04-13T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.37121
published_at 2026-04-04T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.36948
published_at 2026-04-07T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.36999
published_at 2026-04-08T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37013
published_at 2026-04-09T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.37021
published_at 2026-04-11T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.36986
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448782
reference_id 2448782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448782
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
1
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2025-43214
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5sh-5xtn-r7cp
110
url VCID-xpp8-357g-c7gp
vulnerability_id VCID-xpp8-357g-c7gp
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43441
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10647
published_at 2026-04-13T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10558
published_at 2026-04-07T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.1063
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10689
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10703
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10671
published_at 2026-04-12T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43441
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448785
reference_id 2448785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448785
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43441
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xpp8-357g-c7gp
111
url VCID-xr5y-1ebg-xqcj
vulnerability_id VCID-xr5y-1ebg-xqcj
summary webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13502
reference_id
reference_type
scores
0
value 0.0011
scoring_system epss
scoring_elements 0.29379
published_at 2026-04-13T12:55:00Z
1
value 0.0011
scoring_system epss
scoring_elements 0.29472
published_at 2026-04-09T12:55:00Z
2
value 0.0011
scoring_system epss
scoring_elements 0.29475
published_at 2026-04-11T12:55:00Z
3
value 0.0011
scoring_system epss
scoring_elements 0.29498
published_at 2026-04-02T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29546
published_at 2026-04-04T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29367
published_at 2026-04-07T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29431
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416300
reference_id 2416300
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2416300
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
22
reference_url https://access.redhat.com/security/cve/CVE-2025-13502
reference_id CVE-2025-13502
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/security/cve/CVE-2025-13502
23
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:22789
24
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:22790
25
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23110
26
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23433
27
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23434
28
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23451
29
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23452
30
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23583
31
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23591
32
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23742
33
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-13502
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xr5y-1ebg-xqcj
112
url VCID-y388-97uu-3qax
vulnerability_id VCID-y388-97uu-3qax
summary webkit: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54534.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54534
reference_id
reference_type
scores
0
value 0.0107
scoring_system epss
scoring_elements 0.77728
published_at 2026-04-13T12:55:00Z
1
value 0.0107
scoring_system epss
scoring_elements 0.77702
published_at 2026-04-04T12:55:00Z
2
value 0.0107
scoring_system epss
scoring_elements 0.77685
published_at 2026-04-07T12:55:00Z
3
value 0.0107
scoring_system epss
scoring_elements 0.77713
published_at 2026-04-08T12:55:00Z
4
value 0.0107
scoring_system epss
scoring_elements 0.77719
published_at 2026-04-09T12:55:00Z
5
value 0.0107
scoring_system epss
scoring_elements 0.77745
published_at 2026-04-11T12:55:00Z
6
value 0.0107
scoring_system epss
scoring_elements 0.77729
published_at 2026-04-12T12:55:00Z
7
value 0.01113
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54534
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121846
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333846
reference_id 2333846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333846
11
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
12
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
13
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
14
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
15
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
16
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
17
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
18
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
19
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-54534
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y388-97uu-3qax
113
url VCID-y77v-hwy6-hfhy
vulnerability_id VCID-y77v-hwy6-hfhy
summary webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40779
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07846
published_at 2026-04-13T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08614
published_at 2026-04-12T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08638
published_at 2026-04-11T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.0864
published_at 2026-04-09T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08616
published_at 2026-04-08T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08543
published_at 2026-04-07T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08625
published_at 2026-04-04T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08573
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40779
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2302070
reference_id 2302070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2302070
19
reference_url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
reference_id apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
20
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214116
21
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214117
22
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214119
23
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214121
24
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214122
25
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214123
26
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214124
27
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
31
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
32
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
33
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
34
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
35
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
36
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
aliases CVE-2024-40779
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y77v-hwy6-hfhy
114
url VCID-ya13-9pc8-n3ht
vulnerability_id VCID-ya13-9pc8-n3ht
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23222
reference_id
reference_type
scores
0
value 0.00608
scoring_system epss
scoring_elements 0.69696
published_at 2026-04-13T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69723
published_at 2026-04-11T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69709
published_at 2026-04-12T12:55:00Z
3
value 0.00623
scoring_system epss
scoring_elements 0.70076
published_at 2026-04-02T12:55:00Z
4
value 0.00625
scoring_system epss
scoring_elements 0.70137
published_at 2026-04-04T12:55:00Z
5
value 0.00625
scoring_system epss
scoring_elements 0.70178
published_at 2026-04-09T12:55:00Z
6
value 0.00625
scoring_system epss
scoring_elements 0.70162
published_at 2026-04-08T12:55:00Z
7
value 0.00625
scoring_system epss
scoring_elements 0.70115
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/118479
reference_id 118479
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/118479
8
reference_url https://support.apple.com/en-us/120304
reference_id 120304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120304
9
reference_url https://support.apple.com/en-us/120305
reference_id 120305
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120305
10
reference_url https://support.apple.com/en-us/120307
reference_id 120307
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120307
11
reference_url https://support.apple.com/en-us/120309
reference_id 120309
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120309
12
reference_url https://support.apple.com/en-us/120310
reference_id 120310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120310
13
reference_url https://support.apple.com/en-us/120311
reference_id 120311
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120311
14
reference_url https://support.apple.com/en-us/120339
reference_id 120339
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120339
15
reference_url https://support.apple.com/en-us/126632
reference_id 126632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/126632
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259893
reference_id 2259893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259893
17
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
18
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
19
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
22
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
23
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
24
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/6631-1/
reference_id USN-6631-1
reference_type
scores
url https://usn.ubuntu.com/6631-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-23222
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ya13-9pc8-n3ht
115
url VCID-ydxt-4h1z-1kh8
vulnerability_id VCID-ydxt-4h1z-1kh8
summary webkitgtk: A malicious website may cause unexpected cross-origin behavior
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23271.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23271.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23271
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20254
published_at 2026-04-02T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24538
published_at 2026-04-13T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.2473
published_at 2026-04-04T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24502
published_at 2026-04-07T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24573
published_at 2026-04-08T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24619
published_at 2026-04-09T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24636
published_at 2026-04-11T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24593
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23271
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120304
reference_id 120304
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120304
8
reference_url https://support.apple.com/en-us/120306
reference_id 120306
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120306
9
reference_url https://support.apple.com/en-us/120309
reference_id 120309
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120309
10
reference_url https://support.apple.com/en-us/120311
reference_id 120311
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120311
11
reference_url https://support.apple.com/en-us/120339
reference_id 120339
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120339
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314696
reference_id 2314696
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314696
13
reference_url https://support.apple.com/en-us/HT214055
reference_id HT214055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214055
14
reference_url https://support.apple.com/kb/HT214055
reference_id HT214055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214055
15
reference_url https://support.apple.com/en-us/HT214056
reference_id HT214056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214056
16
reference_url https://support.apple.com/kb/HT214056
reference_id HT214056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214056
17
reference_url https://support.apple.com/en-us/HT214059
reference_id HT214059
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214059
18
reference_url https://support.apple.com/kb/HT214059
reference_id HT214059
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214059
19
reference_url https://support.apple.com/en-us/HT214060
reference_id HT214060
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214060
20
reference_url https://support.apple.com/kb/HT214060
reference_id HT214060
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214060
21
reference_url https://support.apple.com/en-us/HT214061
reference_id HT214061
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214061
22
reference_url https://support.apple.com/kb/HT214061
reference_id HT214061
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214061
23
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
24
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
purl pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1164-uckc-qfbs
1
vulnerability VCID-1vsk-e1mf-6uaz
2
vulnerability VCID-1xcs-fpk3-nyg4
3
vulnerability VCID-23pb-y6g6-sbed
4
vulnerability VCID-25ng-4kwb-qfat
5
vulnerability VCID-2hr6-uu49-1qb7
6
vulnerability VCID-2nmg-6jk2-ebcb
7
vulnerability VCID-2pgr-9muu-s3ge
8
vulnerability VCID-2rm2-f5xj-1bb2
9
vulnerability VCID-2vtf-gudd-9fah
10
vulnerability VCID-3daw-8nh6-dfcq
11
vulnerability VCID-3frv-ppjt-9bdy
12
vulnerability VCID-3k6e-zz11-93bn
13
vulnerability VCID-4d1k-nwkw-j3g4
14
vulnerability VCID-4k57-k2s6-wkhx
15
vulnerability VCID-5q44-vqhn-zydx
16
vulnerability VCID-5x1k-uam9-5bhs
17
vulnerability VCID-76jg-y2sa-f7cu
18
vulnerability VCID-7gyr-mvmk-pfh9
19
vulnerability VCID-7j7p-hnbd-hudk
20
vulnerability VCID-7ut5-fu6w-63fs
21
vulnerability VCID-88kv-qter-5fc3
22
vulnerability VCID-8cxd-4p9j-dyf1
23
vulnerability VCID-988h-sqnj-57fg
24
vulnerability VCID-9dnz-1f32-gfdp
25
vulnerability VCID-9j6k-np3x-23f7
26
vulnerability VCID-ahcu-937r-57fu
27
vulnerability VCID-aqvh-emss-bufx
28
vulnerability VCID-az2z-2mnu-sfbh
29
vulnerability VCID-azef-hxum-z3eb
30
vulnerability VCID-b3dw-sj5b-5bhr
31
vulnerability VCID-b8ws-1k92-7bhq
32
vulnerability VCID-bjtx-twmy-jbgk
33
vulnerability VCID-bkcz-d48v-7uca
34
vulnerability VCID-c4np-b4zq-tkch
35
vulnerability VCID-c9mb-24v2-q3ba
36
vulnerability VCID-ceyb-j3sq-27fh
37
vulnerability VCID-cmdy-ztbw-jffq
38
vulnerability VCID-cw56-pdyr-fbge
39
vulnerability VCID-dd4q-8fs5-3kej
40
vulnerability VCID-dvx9-km9t-yqfv
41
vulnerability VCID-ednn-ppw1-myfk
42
vulnerability VCID-ems1-41u6-vbex
43
vulnerability VCID-epzj-t14z-43d2
44
vulnerability VCID-eu4s-vvyf-pqh3
45
vulnerability VCID-ey9n-zksh-mbfm
46
vulnerability VCID-ffha-wafn-sqa9
47
vulnerability VCID-fpvs-seby-kfhv
48
vulnerability VCID-fzqz-yfn1-7yfd
49
vulnerability VCID-gjvy-329h-dkgp
50
vulnerability VCID-gqjq-p4re-gkf6
51
vulnerability VCID-gqm2-5nh3-7ufp
52
vulnerability VCID-gwt6-n8ue-mqcf
53
vulnerability VCID-hp6k-spzk-vbaa
54
vulnerability VCID-hvj6-wsg9-1bhg
55
vulnerability VCID-j31g-7h17-27c8
56
vulnerability VCID-jbuw-yp7v-4fcz
57
vulnerability VCID-jyw2-fu8s-3fha
58
vulnerability VCID-kdvu-rhgt-xqat
59
vulnerability VCID-kp4m-h6ua-h7dm
60
vulnerability VCID-ksq5-ygcp-nbaz
61
vulnerability VCID-kuyh-x3z4-q7gf
62
vulnerability VCID-kx6w-wbua-5ffr
63
vulnerability VCID-ky87-8zpf-nqg2
64
vulnerability VCID-m59e-8bgm-77he
65
vulnerability VCID-mch4-qacj-f7ey
66
vulnerability VCID-mfg4-2ma4-3qgj
67
vulnerability VCID-mhfm-j5xm-wybd
68
vulnerability VCID-mmcp-4qnx-5ufh
69
vulnerability VCID-n7w5-dz8n-mbht
70
vulnerability VCID-nmvc-maj7-rfhm
71
vulnerability VCID-nu9v-3xak-77aw
72
vulnerability VCID-nwkr-s7vs-p7fz
73
vulnerability VCID-p84d-5ze6-9fb5
74
vulnerability VCID-pg5b-3vcj-7bav
75
vulnerability VCID-ph63-r178-pfgg
76
vulnerability VCID-pwqw-z8jj-abfs
77
vulnerability VCID-pyek-9fpp-nudy
78
vulnerability VCID-q3jv-e392-5fef
79
vulnerability VCID-qvy2-8161-eycu
80
vulnerability VCID-qytm-81jk-muhc
81
vulnerability VCID-r857-ke39-xug8
82
vulnerability VCID-rj9q-8rw3-qbbn
83
vulnerability VCID-stjs-xknd-zfgh
84
vulnerability VCID-t46t-rhgu-cbc1
85
vulnerability VCID-teue-y6qz-jyfw
86
vulnerability VCID-tqb3-nabh-tkeh
87
vulnerability VCID-u1sp-38g8-xfan
88
vulnerability VCID-u6k6-1hmc-tfaf
89
vulnerability VCID-u9g4-5f16-yqc9
90
vulnerability VCID-unu1-sbnm-27bf
91
vulnerability VCID-v937-hkz6-v3hc
92
vulnerability VCID-vk4e-qufz-5ffp
93
vulnerability VCID-w3r3-11kt-2ydu
94
vulnerability VCID-w5gq-k53s-tuc5
95
vulnerability VCID-wbn4-ea3w-k7f3
96
vulnerability VCID-whma-xbxr-5uay
97
vulnerability VCID-wnxh-854z-ykfk
98
vulnerability VCID-wrt4-z8ne-zffm
99
vulnerability VCID-x5sh-5xtn-r7cp
100
vulnerability VCID-xpp8-357g-c7gp
101
vulnerability VCID-xr5y-1ebg-xqcj
102
vulnerability VCID-y388-97uu-3qax
103
vulnerability VCID-y77v-hwy6-hfhy
104
vulnerability VCID-yfww-r9rn-73dy
105
vulnerability VCID-yg6b-hsst-ckaa
106
vulnerability VCID-z7hw-fywx-dffc
107
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.44.2-1~deb11u1
aliases CVE-2024-23271
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ydxt-4h1z-1kh8
116
url VCID-yfww-r9rn-73dy
vulnerability_id VCID-yfww-r9rn-73dy
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20608
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02479
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02478
published_at 2026-04-13T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02491
published_at 2026-04-11T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02495
published_at 2026-04-08T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02515
published_at 2026-04-09T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.0248
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20608
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126353
8
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126354
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448789
reference_id 2448789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448789
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
purl pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%2B1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1vsk-e1mf-6uaz
1
vulnerability VCID-1xcs-fpk3-nyg4
2
vulnerability VCID-23pb-y6g6-sbed
3
vulnerability VCID-25ng-4kwb-qfat
4
vulnerability VCID-2hr6-uu49-1qb7
5
vulnerability VCID-2nmg-6jk2-ebcb
6
vulnerability VCID-2pgr-9muu-s3ge
7
vulnerability VCID-2rm2-f5xj-1bb2
8
vulnerability VCID-2vtf-gudd-9fah
9
vulnerability VCID-3daw-8nh6-dfcq
10
vulnerability VCID-3frv-ppjt-9bdy
11
vulnerability VCID-3k6e-zz11-93bn
12
vulnerability VCID-4k57-k2s6-wkhx
13
vulnerability VCID-5q44-vqhn-zydx
14
vulnerability VCID-5x1k-uam9-5bhs
15
vulnerability VCID-76jg-y2sa-f7cu
16
vulnerability VCID-7gyr-mvmk-pfh9
17
vulnerability VCID-7j7p-hnbd-hudk
18
vulnerability VCID-7ut5-fu6w-63fs
19
vulnerability VCID-988h-sqnj-57fg
20
vulnerability VCID-9j6k-np3x-23f7
21
vulnerability VCID-ahcu-937r-57fu
22
vulnerability VCID-aqvh-emss-bufx
23
vulnerability VCID-az2z-2mnu-sfbh
24
vulnerability VCID-azef-hxum-z3eb
25
vulnerability VCID-b3dw-sj5b-5bhr
26
vulnerability VCID-b8ws-1k92-7bhq
27
vulnerability VCID-bjtx-twmy-jbgk
28
vulnerability VCID-bkcz-d48v-7uca
29
vulnerability VCID-c4np-b4zq-tkch
30
vulnerability VCID-c9mb-24v2-q3ba
31
vulnerability VCID-cmdy-ztbw-jffq
32
vulnerability VCID-cw56-pdyr-fbge
33
vulnerability VCID-dd4q-8fs5-3kej
34
vulnerability VCID-dvx9-km9t-yqfv
35
vulnerability VCID-ednn-ppw1-myfk
36
vulnerability VCID-ems1-41u6-vbex
37
vulnerability VCID-epzj-t14z-43d2
38
vulnerability VCID-ey9n-zksh-mbfm
39
vulnerability VCID-fzqz-yfn1-7yfd
40
vulnerability VCID-gqjq-p4re-gkf6
41
vulnerability VCID-gwt6-n8ue-mqcf
42
vulnerability VCID-hp6k-spzk-vbaa
43
vulnerability VCID-hvj6-wsg9-1bhg
44
vulnerability VCID-j31g-7h17-27c8
45
vulnerability VCID-jbuw-yp7v-4fcz
46
vulnerability VCID-jyw2-fu8s-3fha
47
vulnerability VCID-kdvu-rhgt-xqat
48
vulnerability VCID-ksq5-ygcp-nbaz
49
vulnerability VCID-kuyh-x3z4-q7gf
50
vulnerability VCID-kx6w-wbua-5ffr
51
vulnerability VCID-ky87-8zpf-nqg2
52
vulnerability VCID-m59e-8bgm-77he
53
vulnerability VCID-mch4-qacj-f7ey
54
vulnerability VCID-mfg4-2ma4-3qgj
55
vulnerability VCID-mhfm-j5xm-wybd
56
vulnerability VCID-mmcp-4qnx-5ufh
57
vulnerability VCID-n7w5-dz8n-mbht
58
vulnerability VCID-nmvc-maj7-rfhm
59
vulnerability VCID-nu9v-3xak-77aw
60
vulnerability VCID-p84d-5ze6-9fb5
61
vulnerability VCID-ph63-r178-pfgg
62
vulnerability VCID-pwqw-z8jj-abfs
63
vulnerability VCID-pyek-9fpp-nudy
64
vulnerability VCID-qytm-81jk-muhc
65
vulnerability VCID-r857-ke39-xug8
66
vulnerability VCID-rj9q-8rw3-qbbn
67
vulnerability VCID-stjs-xknd-zfgh
68
vulnerability VCID-t46t-rhgu-cbc1
69
vulnerability VCID-tqb3-nabh-tkeh
70
vulnerability VCID-u6k6-1hmc-tfaf
71
vulnerability VCID-u9g4-5f16-yqc9
72
vulnerability VCID-unu1-sbnm-27bf
73
vulnerability VCID-vk4e-qufz-5ffp
74
vulnerability VCID-w3r3-11kt-2ydu
75
vulnerability VCID-w5gq-k53s-tuc5
76
vulnerability VCID-wbn4-ea3w-k7f3
77
vulnerability VCID-whma-xbxr-5uay
78
vulnerability VCID-wnxh-854z-ykfk
79
vulnerability VCID-wrt4-z8ne-zffm
80
vulnerability VCID-x5sh-5xtn-r7cp
81
vulnerability VCID-xpp8-357g-c7gp
82
vulnerability VCID-xr5y-1ebg-xqcj
83
vulnerability VCID-yfww-r9rn-73dy
84
vulnerability VCID-yg6b-hsst-ckaa
85
vulnerability VCID-z7hw-fywx-dffc
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.46.1-2~bpo12%252B1
1
url pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.6-1~deb12u1
aliases CVE-2026-20608
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yfww-r9rn-73dy
117
url VCID-yg6b-hsst-ckaa
vulnerability_id VCID-yg6b-hsst-ckaa
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31278
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.2663
published_at 2026-04-02T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28519
published_at 2026-04-13T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.28699
published_at 2026-04-04T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28505
published_at 2026-04-07T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28569
published_at 2026-04-08T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.2861
published_at 2026-04-09T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28612
published_at 2026-04-11T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28568
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31278
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386269
reference_id 2386269
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386269
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-31278
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6b-hsst-ckaa
118
url VCID-z7hw-fywx-dffc
vulnerability_id VCID-z7hw-fywx-dffc
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43535
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11546
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11478
published_at 2026-04-13T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11601
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.1139
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11473
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11532
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11542
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11508
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43535
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125891
8
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125892
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423188
reference_id 2423188
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423188
10
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
11
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
12
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
13
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
14
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
15
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
16
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
17
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
18
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
19
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
20
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
21
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
purl pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-25ng-4kwb-qfat
1
vulnerability VCID-4k57-k2s6-wkhx
2
vulnerability VCID-7ut5-fu6w-63fs
3
vulnerability VCID-88kv-qter-5fc3
4
vulnerability VCID-8cxd-4p9j-dyf1
5
vulnerability VCID-988h-sqnj-57fg
6
vulnerability VCID-eu4s-vvyf-pqh3
7
vulnerability VCID-ffha-wafn-sqa9
8
vulnerability VCID-fpvs-seby-kfhv
9
vulnerability VCID-gqm2-5nh3-7ufp
10
vulnerability VCID-mmcp-4qnx-5ufh
11
vulnerability VCID-nwkr-s7vs-p7fz
12
vulnerability VCID-t46t-rhgu-cbc1
13
vulnerability VCID-teue-y6qz-jyfw
14
vulnerability VCID-w5gq-k53s-tuc5
15
vulnerability VCID-wrt4-z8ne-zffm
16
vulnerability VCID-x5sh-5xtn-r7cp
17
vulnerability VCID-yfww-r9rn-73dy
18
vulnerability VCID-zk2j-9hd2-hfcn
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.50.4-1~deb12u1
aliases CVE-2025-43535
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7hw-fywx-dffc
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/webkit2gtk@2.42.2-1~deb12u1