Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/wpewebkit@2.52.3-1
Typedeb
Namespacedebian
Namewpewebkit
Version2.52.3-1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1vsk-e1mf-6uaz
vulnerability_id VCID-1vsk-e1mf-6uaz
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43216
reference_id
reference_type
scores
0
value 0.00103
scoring_system epss
scoring_elements 0.28385
published_at 2026-04-02T12:55:00Z
1
value 0.00113
scoring_system epss
scoring_elements 0.29849
published_at 2026-04-07T12:55:00Z
2
value 0.00113
scoring_system epss
scoring_elements 0.29948
published_at 2026-04-09T12:55:00Z
3
value 0.00113
scoring_system epss
scoring_elements 0.29912
published_at 2026-04-08T12:55:00Z
4
value 0.00113
scoring_system epss
scoring_elements 0.30035
published_at 2026-04-04T12:55:00Z
5
value 0.00113
scoring_system epss
scoring_elements 0.29857
published_at 2026-04-13T12:55:00Z
6
value 0.00113
scoring_system epss
scoring_elements 0.29906
published_at 2026-04-12T12:55:00Z
7
value 0.00113
scoring_system epss
scoring_elements 0.29953
published_at 2026-04-11T12:55:00Z
8
value 0.00153
scoring_system epss
scoring_elements 0.36009
published_at 2026-04-21T12:55:00Z
9
value 0.00153
scoring_system epss
scoring_elements 0.36062
published_at 2026-04-18T12:55:00Z
10
value 0.00153
scoring_system epss
scoring_elements 0.36076
published_at 2026-04-16T12:55:00Z
11
value 0.00171
scoring_system epss
scoring_elements 0.37865
published_at 2026-05-05T12:55:00Z
12
value 0.00171
scoring_system epss
scoring_elements 0.381
published_at 2026-04-24T12:55:00Z
13
value 0.00171
scoring_system epss
scoring_elements 0.38077
published_at 2026-04-26T12:55:00Z
14
value 0.00171
scoring_system epss
scoring_elements 0.37983
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386273
reference_id 2386273
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386273
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43216
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1vsk-e1mf-6uaz
1
url VCID-25ng-4kwb-qfat
vulnerability_id VCID-25ng-4kwb-qfat
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20636
reference_id
reference_type
scores
0
value 0.00041
scoring_system epss
scoring_elements 0.12694
published_at 2026-04-02T12:55:00Z
1
value 0.00041
scoring_system epss
scoring_elements 0.12549
published_at 2026-04-07T12:55:00Z
2
value 0.00041
scoring_system epss
scoring_elements 0.12738
published_at 2026-04-04T12:55:00Z
3
value 0.00041
scoring_system epss
scoring_elements 0.12628
published_at 2026-04-08T12:55:00Z
4
value 0.00041
scoring_system epss
scoring_elements 0.1268
published_at 2026-04-09T12:55:00Z
5
value 0.00041
scoring_system epss
scoring_elements 0.12648
published_at 2026-04-11T12:55:00Z
6
value 0.00041
scoring_system epss
scoring_elements 0.12606
published_at 2026-04-12T12:55:00Z
7
value 0.00041
scoring_system epss
scoring_elements 0.12561
published_at 2026-04-13T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12468
published_at 2026-04-16T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12475
published_at 2026-04-18T12:55:00Z
10
value 0.0006
scoring_system epss
scoring_elements 0.18309
published_at 2026-05-05T12:55:00Z
11
value 0.0006
scoring_system epss
scoring_elements 0.18499
published_at 2026-04-24T12:55:00Z
12
value 0.0006
scoring_system epss
scoring_elements 0.18485
published_at 2026-04-26T12:55:00Z
13
value 0.0006
scoring_system epss
scoring_elements 0.18442
published_at 2026-04-29T12:55:00Z
14
value 0.0006
scoring_system epss
scoring_elements 0.18606
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20636
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126348
6
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126353
7
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/
url https://support.apple.com/en-us/126354
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448791
reference_id 2448791
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448791
9
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
10
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
11
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
12
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
13
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-20636
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-25ng-4kwb-qfat
2
url VCID-2hr6-uu49-1qb7
vulnerability_id VCID-2hr6-uu49-1qb7
summary webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13947
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10276
published_at 2026-05-05T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17412
published_at 2026-04-02T12:55:00Z
2
value 0.00074
scoring_system epss
scoring_elements 0.22386
published_at 2026-04-16T12:55:00Z
3
value 0.00074
scoring_system epss
scoring_elements 0.22382
published_at 2026-04-18T12:55:00Z
4
value 0.00074
scoring_system epss
scoring_elements 0.22519
published_at 2026-04-04T12:55:00Z
5
value 0.00074
scoring_system epss
scoring_elements 0.22307
published_at 2026-04-07T12:55:00Z
6
value 0.00074
scoring_system epss
scoring_elements 0.22388
published_at 2026-04-08T12:55:00Z
7
value 0.00074
scoring_system epss
scoring_elements 0.22443
published_at 2026-04-09T12:55:00Z
8
value 0.00074
scoring_system epss
scoring_elements 0.22464
published_at 2026-04-11T12:55:00Z
9
value 0.00074
scoring_system epss
scoring_elements 0.22423
published_at 2026-04-12T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22368
published_at 2026-04-13T12:55:00Z
11
value 0.00075
scoring_system epss
scoring_elements 0.2247
published_at 2026-04-24T12:55:00Z
12
value 0.00075
scoring_system epss
scoring_elements 0.22459
published_at 2026-04-29T12:55:00Z
13
value 0.00075
scoring_system epss
scoring_elements 0.22624
published_at 2026-04-21T12:55:00Z
14
value 0.00075
scoring_system epss
scoring_elements 0.2246
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13947
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418576
reference_id 2418576
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2418576
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
22
reference_url https://access.redhat.com/security/cve/CVE-2025-13947
reference_id CVE-2025-13947
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/security/cve/CVE-2025-13947
23
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:22789
24
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:22790
25
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23110
26
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23433
27
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23434
28
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23451
29
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23452
30
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23583
31
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23591
32
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23742
33
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://access.redhat.com/errata/RHSA-2025:23743
34
reference_url https://bugs.webkit.org/show_bug.cgi?id=271957
reference_id show_bug.cgi?id=271957
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/
url https://bugs.webkit.org/show_bug.cgi?id=271957
35
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-13947
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2hr6-uu49-1qb7
3
url VCID-2pgr-9muu-s3ge
vulnerability_id VCID-2pgr-9muu-s3ge
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43443
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.14973
published_at 2026-04-07T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15169
published_at 2026-04-04T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.14982
published_at 2026-04-13T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15043
published_at 2026-04-12T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15081
published_at 2026-04-11T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15114
published_at 2026-04-09T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15061
published_at 2026-04-08T12:55:00Z
7
value 0.00052
scoring_system epss
scoring_elements 0.16305
published_at 2026-04-02T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20206
published_at 2026-05-05T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20468
published_at 2026-04-16T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20467
published_at 2026-04-18T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.2034
published_at 2026-04-24T12:55:00Z
12
value 0.00066
scoring_system epss
scoring_elements 0.20335
published_at 2026-04-26T12:55:00Z
13
value 0.00066
scoring_system epss
scoring_elements 0.20302
published_at 2026-04-29T12:55:00Z
14
value 0.00068
scoring_system epss
scoring_elements 0.2087
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43443
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416337
reference_id 2416337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416337
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43443
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgr-9muu-s3ge
4
url VCID-3k6e-zz11-93bn
vulnerability_id VCID-3k6e-zz11-93bn
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31273
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.26463
published_at 2026-04-02T12:55:00Z
1
value 0.00104
scoring_system epss
scoring_elements 0.28318
published_at 2026-04-07T12:55:00Z
2
value 0.00104
scoring_system epss
scoring_elements 0.28427
published_at 2026-04-09T12:55:00Z
3
value 0.00104
scoring_system epss
scoring_elements 0.28384
published_at 2026-04-08T12:55:00Z
4
value 0.00104
scoring_system epss
scoring_elements 0.28524
published_at 2026-04-04T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.2833
published_at 2026-04-13T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28387
published_at 2026-04-12T12:55:00Z
7
value 0.00104
scoring_system epss
scoring_elements 0.28431
published_at 2026-04-11T12:55:00Z
8
value 0.00141
scoring_system epss
scoring_elements 0.34218
published_at 2026-04-21T12:55:00Z
9
value 0.00141
scoring_system epss
scoring_elements 0.34253
published_at 2026-04-18T12:55:00Z
10
value 0.00141
scoring_system epss
scoring_elements 0.34265
published_at 2026-04-16T12:55:00Z
11
value 0.00157
scoring_system epss
scoring_elements 0.35947
published_at 2026-05-05T12:55:00Z
12
value 0.00157
scoring_system epss
scoring_elements 0.3618
published_at 2026-04-24T12:55:00Z
13
value 0.00157
scoring_system epss
scoring_elements 0.3615
published_at 2026-04-26T12:55:00Z
14
value 0.00157
scoring_system epss
scoring_elements 0.36063
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31273
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386268
reference_id 2386268
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386268
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-31273
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3k6e-zz11-93bn
5
url VCID-4k57-k2s6-wkhx
vulnerability_id VCID-4k57-k2s6-wkhx
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20644
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.1368
published_at 2026-04-02T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13741
published_at 2026-04-04T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13542
published_at 2026-04-07T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13623
published_at 2026-04-08T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13674
published_at 2026-04-09T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13644
published_at 2026-04-11T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13607
published_at 2026-04-12T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13559
published_at 2026-04-13T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13474
published_at 2026-04-16T12:55:00Z
9
value 0.00044
scoring_system epss
scoring_elements 0.1347
published_at 2026-04-18T12:55:00Z
10
value 0.00074
scoring_system epss
scoring_elements 0.22256
published_at 2026-04-24T12:55:00Z
11
value 0.00074
scoring_system epss
scoring_elements 0.22238
published_at 2026-04-29T12:55:00Z
12
value 0.00074
scoring_system epss
scoring_elements 0.22135
published_at 2026-05-05T12:55:00Z
13
value 0.00074
scoring_system epss
scoring_elements 0.22409
published_at 2026-04-21T12:55:00Z
14
value 0.00074
scoring_system epss
scoring_elements 0.22243
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20644
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126353
8
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/
url https://support.apple.com/en-us/126354
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448792
reference_id 2448792
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448792
10
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
11
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
12
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
13
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
14
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-20644
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4k57-k2s6-wkhx
6
url VCID-5q44-vqhn-zydx
vulnerability_id VCID-5q44-vqhn-zydx
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43212
reference_id
reference_type
scores
0
value 0.00085
scoring_system epss
scoring_elements 0.24845
published_at 2026-04-02T12:55:00Z
1
value 0.00094
scoring_system epss
scoring_elements 0.26106
published_at 2026-04-07T12:55:00Z
2
value 0.00094
scoring_system epss
scoring_elements 0.26221
published_at 2026-04-09T12:55:00Z
3
value 0.00094
scoring_system epss
scoring_elements 0.26173
published_at 2026-04-08T12:55:00Z
4
value 0.00094
scoring_system epss
scoring_elements 0.26334
published_at 2026-04-04T12:55:00Z
5
value 0.00094
scoring_system epss
scoring_elements 0.26124
published_at 2026-04-13T12:55:00Z
6
value 0.00094
scoring_system epss
scoring_elements 0.26184
published_at 2026-04-12T12:55:00Z
7
value 0.00094
scoring_system epss
scoring_elements 0.26229
published_at 2026-04-11T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.3198
published_at 2026-04-21T12:55:00Z
9
value 0.00127
scoring_system epss
scoring_elements 0.32006
published_at 2026-04-18T12:55:00Z
10
value 0.00127
scoring_system epss
scoring_elements 0.32029
published_at 2026-04-16T12:55:00Z
11
value 0.00141
scoring_system epss
scoring_elements 0.33723
published_at 2026-05-05T12:55:00Z
12
value 0.00141
scoring_system epss
scoring_elements 0.33949
published_at 2026-04-24T12:55:00Z
13
value 0.00141
scoring_system epss
scoring_elements 0.33928
published_at 2026-04-26T12:55:00Z
14
value 0.00141
scoring_system epss
scoring_elements 0.33844
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43212
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386271
reference_id 2386271
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386271
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43212
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5q44-vqhn-zydx
7
url VCID-76jg-y2sa-f7cu
vulnerability_id VCID-76jg-y2sa-f7cu
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43501
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22817
published_at 2026-04-02T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22861
published_at 2026-04-04T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22652
published_at 2026-04-07T12:55:00Z
3
value 0.00076
scoring_system epss
scoring_elements 0.22728
published_at 2026-04-08T12:55:00Z
4
value 0.00076
scoring_system epss
scoring_elements 0.22779
published_at 2026-04-09T12:55:00Z
5
value 0.00076
scoring_system epss
scoring_elements 0.22801
published_at 2026-04-11T12:55:00Z
6
value 0.00076
scoring_system epss
scoring_elements 0.22763
published_at 2026-04-12T12:55:00Z
7
value 0.00076
scoring_system epss
scoring_elements 0.22706
published_at 2026-04-13T12:55:00Z
8
value 0.00076
scoring_system epss
scoring_elements 0.22722
published_at 2026-04-16T12:55:00Z
9
value 0.00107
scoring_system epss
scoring_elements 0.28795
published_at 2026-04-24T12:55:00Z
10
value 0.00107
scoring_system epss
scoring_elements 0.28916
published_at 2026-04-21T12:55:00Z
11
value 0.00107
scoring_system epss
scoring_elements 0.28684
published_at 2026-04-26T12:55:00Z
12
value 0.00107
scoring_system epss
scoring_elements 0.28615
published_at 2026-04-29T12:55:00Z
13
value 0.00107
scoring_system epss
scoring_elements 0.2846
published_at 2026-05-05T12:55:00Z
14
value 0.00107
scoring_system epss
scoring_elements 0.28961
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43501
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125891
8
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/
url https://support.apple.com/en-us/125892
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423185
reference_id 2423185
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423185
10
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
11
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
12
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
13
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
14
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
15
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
16
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
17
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
18
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
19
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
20
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
21
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43501
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-76jg-y2sa-f7cu
8
url VCID-7j7p-hnbd-hudk
vulnerability_id VCID-7j7p-hnbd-hudk
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43429
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.13587
published_at 2026-04-07T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.13785
published_at 2026-04-04T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13604
published_at 2026-04-13T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13653
published_at 2026-04-12T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13689
published_at 2026-04-11T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13719
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13667
published_at 2026-04-08T12:55:00Z
7
value 0.00046
scoring_system epss
scoring_elements 0.14338
published_at 2026-04-02T12:55:00Z
8
value 0.00061
scoring_system epss
scoring_elements 0.18631
published_at 2026-05-05T12:55:00Z
9
value 0.00061
scoring_system epss
scoring_elements 0.18902
published_at 2026-04-16T12:55:00Z
10
value 0.00061
scoring_system epss
scoring_elements 0.18915
published_at 2026-04-18T12:55:00Z
11
value 0.00061
scoring_system epss
scoring_elements 0.18817
published_at 2026-04-24T12:55:00Z
12
value 0.00061
scoring_system epss
scoring_elements 0.18796
published_at 2026-04-26T12:55:00Z
13
value 0.00061
scoring_system epss
scoring_elements 0.18751
published_at 2026-04-29T12:55:00Z
14
value 0.00062
scoring_system epss
scoring_elements 0.19305
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43429
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416330
reference_id 2416330
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416330
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43429
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7j7p-hnbd-hudk
9
url VCID-7ut5-fu6w-63fs
vulnerability_id VCID-7ut5-fu6w-63fs
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43213
reference_id
reference_type
scores
0
value 0.0012
scoring_system epss
scoring_elements 0.3113
published_at 2026-04-02T12:55:00Z
1
value 0.00121
scoring_system epss
scoring_elements 0.31172
published_at 2026-04-07T12:55:00Z
2
value 0.00121
scoring_system epss
scoring_elements 0.31256
published_at 2026-04-09T12:55:00Z
3
value 0.00121
scoring_system epss
scoring_elements 0.31225
published_at 2026-04-08T12:55:00Z
4
value 0.00121
scoring_system epss
scoring_elements 0.31353
published_at 2026-04-04T12:55:00Z
5
value 0.00121
scoring_system epss
scoring_elements 0.31173
published_at 2026-04-13T12:55:00Z
6
value 0.00121
scoring_system epss
scoring_elements 0.31216
published_at 2026-04-12T12:55:00Z
7
value 0.00121
scoring_system epss
scoring_elements 0.3126
published_at 2026-04-11T12:55:00Z
8
value 0.00164
scoring_system epss
scoring_elements 0.37363
published_at 2026-04-21T12:55:00Z
9
value 0.00164
scoring_system epss
scoring_elements 0.37419
published_at 2026-04-18T12:55:00Z
10
value 0.00164
scoring_system epss
scoring_elements 0.37437
published_at 2026-04-16T12:55:00Z
11
value 0.00183
scoring_system epss
scoring_elements 0.39577
published_at 2026-05-05T12:55:00Z
12
value 0.00183
scoring_system epss
scoring_elements 0.39794
published_at 2026-04-26T12:55:00Z
13
value 0.00183
scoring_system epss
scoring_elements 0.39709
published_at 2026-04-29T12:55:00Z
14
value 0.00199
scoring_system epss
scoring_elements 0.41898
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448781
reference_id 2448781
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448781
11
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
12
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
13
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
14
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
15
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43213
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ut5-fu6w-63fs
10
url VCID-88kv-qter-5fc3
vulnerability_id VCID-88kv-qter-5fc3
summary webkitgtk: A malicious website may be able to access script message handlers intended for other origins
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28861
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10377
published_at 2026-04-07T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10448
published_at 2026-04-02T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10517
published_at 2026-04-04T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.1045
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10514
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10544
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10511
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10489
published_at 2026-04-13T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10356
published_at 2026-04-16T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.1033
published_at 2026-04-18T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10458
published_at 2026-04-21T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10444
published_at 2026-04-24T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11359
published_at 2026-05-05T12:55:00Z
13
value 0.00039
scoring_system epss
scoring_elements 0.11502
published_at 2026-04-26T12:55:00Z
14
value 0.00039
scoring_system epss
scoring_elements 0.1143
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28861
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126793
reference_id 126793
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/
url https://support.apple.com/en-us/126793
6
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/
url https://support.apple.com/en-us/126794
7
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/
url https://support.apple.com/en-us/126799
8
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/
url https://support.apple.com/en-us/126800
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453007
reference_id 2453007
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453007
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-28861
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-88kv-qter-5fc3
11
url VCID-8cxd-4p9j-dyf1
vulnerability_id VCID-8cxd-4p9j-dyf1
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20664
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11507
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11348
published_at 2026-04-07T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11561
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11432
published_at 2026-04-08T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11489
published_at 2026-04-09T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11495
published_at 2026-04-11T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11462
published_at 2026-04-12T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11433
published_at 2026-04-13T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11299
published_at 2026-04-18T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11422
published_at 2026-04-21T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11366
published_at 2026-04-24T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12563
published_at 2026-04-26T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12445
published_at 2026-04-29T12:55:00Z
13
value 0.00041
scoring_system epss
scoring_elements 0.12357
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20664
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/
url https://support.apple.com/en-us/126794
6
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/
url https://support.apple.com/en-us/126799
7
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/
url https://support.apple.com/en-us/126800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453001
reference_id 2453001
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453001
9
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
10
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
11
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
12
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
13
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-20664
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8cxd-4p9j-dyf1
12
url VCID-988h-sqnj-57fg
vulnerability_id VCID-988h-sqnj-57fg
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43511
reference_id
reference_type
scores
0
value 0.00061
scoring_system epss
scoring_elements 0.19277
published_at 2026-04-02T12:55:00Z
1
value 0.00061
scoring_system epss
scoring_elements 0.1933
published_at 2026-04-04T12:55:00Z
2
value 0.00061
scoring_system epss
scoring_elements 0.19178
published_at 2026-04-09T12:55:00Z
3
value 0.00061
scoring_system epss
scoring_elements 0.19125
published_at 2026-04-08T12:55:00Z
4
value 0.00061
scoring_system epss
scoring_elements 0.19045
published_at 2026-04-07T12:55:00Z
5
value 0.00061
scoring_system epss
scoring_elements 0.19139
published_at 2026-04-12T12:55:00Z
6
value 0.00061
scoring_system epss
scoring_elements 0.19184
published_at 2026-04-11T12:55:00Z
7
value 0.00087
scoring_system epss
scoring_elements 0.24924
published_at 2026-04-18T12:55:00Z
8
value 0.00087
scoring_system epss
scoring_elements 0.24932
published_at 2026-04-16T12:55:00Z
9
value 0.00087
scoring_system epss
scoring_elements 0.24919
published_at 2026-04-13T12:55:00Z
10
value 0.00126
scoring_system epss
scoring_elements 0.31348
published_at 2026-05-05T12:55:00Z
11
value 0.00126
scoring_system epss
scoring_elements 0.31875
published_at 2026-04-21T12:55:00Z
12
value 0.00126
scoring_system epss
scoring_elements 0.31708
published_at 2026-04-24T12:55:00Z
13
value 0.00126
scoring_system epss
scoring_elements 0.31581
published_at 2026-04-26T12:55:00Z
14
value 0.00126
scoring_system epss
scoring_elements 0.31497
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43511
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125633
5
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125884
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125890
8
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125891
9
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/
url https://support.apple.com/en-us/125892
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448787
reference_id 2448787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448787
11
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
12
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
13
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
14
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
15
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43511
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-988h-sqnj-57fg
13
url VCID-ahcu-937r-57fu
vulnerability_id VCID-ahcu-937r-57fu
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43430
reference_id
reference_type
scores
0
value 0.00095
scoring_system epss
scoring_elements 0.2633
published_at 2026-04-13T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26388
published_at 2026-04-12T12:55:00Z
2
value 0.00095
scoring_system epss
scoring_elements 0.26434
published_at 2026-04-11T12:55:00Z
3
value 0.00095
scoring_system epss
scoring_elements 0.26426
published_at 2026-04-09T12:55:00Z
4
value 0.00095
scoring_system epss
scoring_elements 0.26376
published_at 2026-04-08T12:55:00Z
5
value 0.00095
scoring_system epss
scoring_elements 0.26528
published_at 2026-04-04T12:55:00Z
6
value 0.00095
scoring_system epss
scoring_elements 0.26308
published_at 2026-04-07T12:55:00Z
7
value 0.00097
scoring_system epss
scoring_elements 0.26426
published_at 2026-05-05T12:55:00Z
8
value 0.00097
scoring_system epss
scoring_elements 0.26759
published_at 2026-04-16T12:55:00Z
9
value 0.00097
scoring_system epss
scoring_elements 0.26731
published_at 2026-04-18T12:55:00Z
10
value 0.00097
scoring_system epss
scoring_elements 0.26638
published_at 2026-04-24T12:55:00Z
11
value 0.00097
scoring_system epss
scoring_elements 0.26631
published_at 2026-04-26T12:55:00Z
12
value 0.00097
scoring_system epss
scoring_elements 0.26559
published_at 2026-04-29T12:55:00Z
13
value 0.00099
scoring_system epss
scoring_elements 0.27201
published_at 2026-04-02T12:55:00Z
14
value 0.001
scoring_system epss
scoring_elements 0.27546
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43430
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416331
reference_id 2416331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416331
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43430
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ahcu-937r-57fu
14
url VCID-aqvh-emss-bufx
vulnerability_id VCID-aqvh-emss-bufx
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43368
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14765
published_at 2026-04-09T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14812
published_at 2026-04-04T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.14617
published_at 2026-04-07T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14706
published_at 2026-04-08T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15105
published_at 2026-04-02T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17153
published_at 2026-04-11T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17106
published_at 2026-04-12T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.17045
published_at 2026-04-13T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16981
published_at 2026-04-16T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16984
published_at 2026-04-18T12:55:00Z
10
value 0.0007
scoring_system epss
scoring_elements 0.21392
published_at 2026-04-26T12:55:00Z
11
value 0.0007
scoring_system epss
scoring_elements 0.21543
published_at 2026-04-21T12:55:00Z
12
value 0.0007
scoring_system epss
scoring_elements 0.21396
published_at 2026-04-24T12:55:00Z
13
value 0.0007
scoring_system epss
scoring_elements 0.21378
published_at 2026-04-29T12:55:00Z
14
value 0.0007
scoring_system epss
scoring_elements 0.21283
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43368
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/
url https://support.apple.com/en-us/125113
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397630
reference_id 2397630
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397630
7
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
8
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
9
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
10
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
11
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
12
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
13
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
14
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
15
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
16
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
17
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
18
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43368
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-aqvh-emss-bufx
15
url VCID-az2z-2mnu-sfbh
vulnerability_id VCID-az2z-2mnu-sfbh
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43419
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10546
published_at 2026-04-04T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10411
published_at 2026-04-07T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10484
published_at 2026-04-08T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10552
published_at 2026-04-09T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10581
published_at 2026-04-11T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10548
published_at 2026-04-12T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10526
published_at 2026-04-13T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.11092
published_at 2026-04-02T12:55:00Z
8
value 0.00055
scoring_system epss
scoring_elements 0.17182
published_at 2026-04-16T12:55:00Z
9
value 0.00055
scoring_system epss
scoring_elements 0.17189
published_at 2026-04-18T12:55:00Z
10
value 0.00055
scoring_system epss
scoring_elements 0.17129
published_at 2026-04-24T12:55:00Z
11
value 0.00055
scoring_system epss
scoring_elements 0.17109
published_at 2026-04-26T12:55:00Z
12
value 0.00055
scoring_system epss
scoring_elements 0.17052
published_at 2026-04-29T12:55:00Z
13
value 0.00055
scoring_system epss
scoring_elements 0.16916
published_at 2026-05-05T12:55:00Z
14
value 0.00056
scoring_system epss
scoring_elements 0.17625
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43419
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125113
6
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125114
7
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125115
8
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/
url https://support.apple.com/en-us/125116
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416326
reference_id 2416326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416326
10
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
11
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
12
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
13
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
14
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
15
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
16
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
17
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
18
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
19
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43419
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-az2z-2mnu-sfbh
16
url VCID-bjtx-twmy-jbgk
vulnerability_id VCID-bjtx-twmy-jbgk
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43438
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10558
published_at 2026-04-07T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10647
published_at 2026-04-13T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10671
published_at 2026-04-12T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10703
published_at 2026-04-11T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10689
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.1063
published_at 2026-04-08T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-02T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14896
published_at 2026-05-05T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14981
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14991
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15041
published_at 2026-04-21T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.1508
published_at 2026-04-24T12:55:00Z
13
value 0.00049
scoring_system epss
scoring_elements 0.15081
published_at 2026-04-26T12:55:00Z
14
value 0.00049
scoring_system epss
scoring_elements 0.15025
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43438
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448784
reference_id 2448784
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448784
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43438
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bjtx-twmy-jbgk
17
url VCID-dvx9-km9t-yqfv
vulnerability_id VCID-dvx9-km9t-yqfv
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43531
reference_id
reference_type
scores
0
value 0.00118
scoring_system epss
scoring_elements 0.30817
published_at 2026-04-02T12:55:00Z
1
value 0.00118
scoring_system epss
scoring_elements 0.30711
published_at 2026-04-16T12:55:00Z
2
value 0.00118
scoring_system epss
scoring_elements 0.30687
published_at 2026-04-13T12:55:00Z
3
value 0.00118
scoring_system epss
scoring_elements 0.30733
published_at 2026-04-12T12:55:00Z
4
value 0.00118
scoring_system epss
scoring_elements 0.30777
published_at 2026-04-11T12:55:00Z
5
value 0.00118
scoring_system epss
scoring_elements 0.30774
published_at 2026-04-09T12:55:00Z
6
value 0.00118
scoring_system epss
scoring_elements 0.30742
published_at 2026-04-08T12:55:00Z
7
value 0.00118
scoring_system epss
scoring_elements 0.30865
published_at 2026-04-04T12:55:00Z
8
value 0.00118
scoring_system epss
scoring_elements 0.30683
published_at 2026-04-07T12:55:00Z
9
value 0.00168
scoring_system epss
scoring_elements 0.37463
published_at 2026-05-05T12:55:00Z
10
value 0.00168
scoring_system epss
scoring_elements 0.37968
published_at 2026-04-18T12:55:00Z
11
value 0.00168
scoring_system epss
scoring_elements 0.37908
published_at 2026-04-21T12:55:00Z
12
value 0.00168
scoring_system epss
scoring_elements 0.37694
published_at 2026-04-24T12:55:00Z
13
value 0.00168
scoring_system epss
scoring_elements 0.37672
published_at 2026-04-26T12:55:00Z
14
value 0.00168
scoring_system epss
scoring_elements 0.37579
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43531
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125889
reference_id 125889
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125889
8
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125890
9
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125891
10
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 3.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/
url https://support.apple.com/en-us/125892
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423187
reference_id 2423187
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423187
12
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
13
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
14
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
15
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
16
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
17
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
18
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
19
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
20
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
21
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
22
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
23
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43531
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dvx9-km9t-yqfv
18
url VCID-ednn-ppw1-myfk
vulnerability_id VCID-ednn-ppw1-myfk
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43272
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14693
published_at 2026-04-02T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19534
published_at 2026-04-07T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19812
published_at 2026-04-04T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19614
published_at 2026-04-08T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.19667
published_at 2026-04-09T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.21983
published_at 2026-04-16T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21978
published_at 2026-04-18T12:55:00Z
7
value 0.00072
scoring_system epss
scoring_elements 0.22086
published_at 2026-04-11T12:55:00Z
8
value 0.00072
scoring_system epss
scoring_elements 0.22045
published_at 2026-04-12T12:55:00Z
9
value 0.00072
scoring_system epss
scoring_elements 0.21985
published_at 2026-04-13T12:55:00Z
10
value 0.00094
scoring_system epss
scoring_elements 0.25834
published_at 2026-05-05T12:55:00Z
11
value 0.00094
scoring_system epss
scoring_elements 0.25943
published_at 2026-04-29T12:55:00Z
12
value 0.00094
scoring_system epss
scoring_elements 0.25992
published_at 2026-04-26T12:55:00Z
13
value 0.00094
scoring_system epss
scoring_elements 0.25996
published_at 2026-04-24T12:55:00Z
14
value 0.00094
scoring_system epss
scoring_elements 0.26056
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43272
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125113
6
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125115
7
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/
url https://support.apple.com/en-us/125116
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397626
reference_id 2397626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397626
9
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
10
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
11
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
12
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
13
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
14
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
15
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
16
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
17
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
18
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
19
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
20
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43272
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ednn-ppw1-myfk
19
url VCID-ems1-41u6-vbex
vulnerability_id VCID-ems1-41u6-vbex
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43458
reference_id
reference_type
scores
0
value 0.00072
scoring_system epss
scoring_elements 0.21892
published_at 2026-04-07T12:55:00Z
1
value 0.00072
scoring_system epss
scoring_elements 0.22117
published_at 2026-04-04T12:55:00Z
2
value 0.00072
scoring_system epss
scoring_elements 0.21944
published_at 2026-04-13T12:55:00Z
3
value 0.00072
scoring_system epss
scoring_elements 0.22003
published_at 2026-04-12T12:55:00Z
4
value 0.00072
scoring_system epss
scoring_elements 0.22044
published_at 2026-04-11T12:55:00Z
5
value 0.00072
scoring_system epss
scoring_elements 0.22029
published_at 2026-04-09T12:55:00Z
6
value 0.00072
scoring_system epss
scoring_elements 0.21974
published_at 2026-04-08T12:55:00Z
7
value 0.00075
scoring_system epss
scoring_elements 0.22678
published_at 2026-04-02T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27243
published_at 2026-05-05T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27709
published_at 2026-04-16T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27683
published_at 2026-04-18T12:55:00Z
11
value 0.001
scoring_system epss
scoring_elements 0.27593
published_at 2026-04-24T12:55:00Z
12
value 0.001
scoring_system epss
scoring_elements 0.27485
published_at 2026-04-26T12:55:00Z
13
value 0.001
scoring_system epss
scoring_elements 0.27413
published_at 2026-04-29T12:55:00Z
14
value 0.00103
scoring_system epss
scoring_elements 0.28104
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43458
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418855
reference_id 2418855
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2418855
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43458
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ems1-41u6-vbex
20
url VCID-epzj-t14z-43d2
vulnerability_id VCID-epzj-t14z-43d2
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43421
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08272
published_at 2026-04-07T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08327
published_at 2026-04-04T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08336
published_at 2026-04-08T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08353
published_at 2026-04-09T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08344
published_at 2026-04-11T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08324
published_at 2026-04-12T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08307
published_at 2026-04-13T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08623
published_at 2026-04-02T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11349
published_at 2026-04-24T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.1128
published_at 2026-04-18T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11306
published_at 2026-04-26T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11241
published_at 2026-04-29T12:55:00Z
12
value 0.00038
scoring_system epss
scoring_elements 0.11175
published_at 2026-05-05T12:55:00Z
13
value 0.00038
scoring_system epss
scoring_elements 0.11279
published_at 2026-04-16T12:55:00Z
14
value 0.00039
scoring_system epss
scoring_elements 0.11718
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43421
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125638
7
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/
url https://support.apple.com/en-us/125640
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416355
reference_id 2416355
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416355
9
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
10
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
11
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
12
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
13
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
14
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
15
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
16
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
17
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
18
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
19
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
20
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43421
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-epzj-t14z-43d2
21
url VCID-eu4s-vvyf-pqh3
vulnerability_id VCID-eu4s-vvyf-pqh3
summary webkitgtk: Visiting a maliciously crafted website may lead to a cross-site scripting attack
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28871
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.10075
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.10032
published_at 2026-04-07T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.10135
published_at 2026-04-04T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.10108
published_at 2026-04-08T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.10169
published_at 2026-04-12T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.10209
published_at 2026-04-11T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.10149
published_at 2026-04-13T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.10022
published_at 2026-04-16T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09999
published_at 2026-04-18T12:55:00Z
9
value 0.00034
scoring_system epss
scoring_elements 0.10129
published_at 2026-04-21T12:55:00Z
10
value 0.00034
scoring_system epss
scoring_elements 0.10105
published_at 2026-04-24T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.11098
published_at 2026-04-26T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.11035
published_at 2026-04-29T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.1097
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28871
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126793
reference_id 126793
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/
url https://support.apple.com/en-us/126793
6
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/
url https://support.apple.com/en-us/126794
7
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/
url https://support.apple.com/en-us/126800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453008
reference_id 2453008
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453008
9
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
10
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
11
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
12
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
13
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-28871
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eu4s-vvyf-pqh3
22
url VCID-ffha-wafn-sqa9
vulnerability_id VCID-ffha-wafn-sqa9
summary webkitgtk: A malicious website may be able to process restricted web content outside the sandbox
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28859
reference_id
reference_type
scores
0
value 0.00039
scoring_system epss
scoring_elements 0.12006
published_at 2026-04-02T12:55:00Z
1
value 0.00039
scoring_system epss
scoring_elements 0.11889
published_at 2026-04-24T12:55:00Z
2
value 0.00039
scoring_system epss
scoring_elements 0.11919
published_at 2026-04-21T12:55:00Z
3
value 0.00039
scoring_system epss
scoring_elements 0.118
published_at 2026-04-18T12:55:00Z
4
value 0.00039
scoring_system epss
scoring_elements 0.11803
published_at 2026-04-16T12:55:00Z
5
value 0.00039
scoring_system epss
scoring_elements 0.11933
published_at 2026-04-13T12:55:00Z
6
value 0.00039
scoring_system epss
scoring_elements 0.11959
published_at 2026-04-12T12:55:00Z
7
value 0.00039
scoring_system epss
scoring_elements 0.11996
published_at 2026-04-11T12:55:00Z
8
value 0.00039
scoring_system epss
scoring_elements 0.11988
published_at 2026-04-09T12:55:00Z
9
value 0.00039
scoring_system epss
scoring_elements 0.11936
published_at 2026-04-08T12:55:00Z
10
value 0.00039
scoring_system epss
scoring_elements 0.1205
published_at 2026-04-04T12:55:00Z
11
value 0.00039
scoring_system epss
scoring_elements 0.11853
published_at 2026-04-07T12:55:00Z
12
value 0.00043
scoring_system epss
scoring_elements 0.12882
published_at 2026-05-05T12:55:00Z
13
value 0.00043
scoring_system epss
scoring_elements 0.1308
published_at 2026-04-26T12:55:00Z
14
value 0.00043
scoring_system epss
scoring_elements 0.12977
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28859
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126794
6
reference_url https://support.apple.com/en-us/126797
reference_id 126797
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126797
7
reference_url https://support.apple.com/en-us/126798
reference_id 126798
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126798
8
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126799
9
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/
url https://support.apple.com/en-us/126800
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453006
reference_id 2453006
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453006
11
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
12
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
13
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
14
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
15
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-28859
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ffha-wafn-sqa9
23
url VCID-fpvs-seby-kfhv
vulnerability_id VCID-fpvs-seby-kfhv
summary webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20691
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10448
published_at 2026-04-02T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10517
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10377
published_at 2026-04-07T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.1045
published_at 2026-04-08T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10514
published_at 2026-04-09T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10544
published_at 2026-04-11T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10511
published_at 2026-04-12T12:55:00Z
7
value 0.00035
scoring_system epss
scoring_elements 0.10489
published_at 2026-04-13T12:55:00Z
8
value 0.00035
scoring_system epss
scoring_elements 0.10356
published_at 2026-04-16T12:55:00Z
9
value 0.00035
scoring_system epss
scoring_elements 0.1033
published_at 2026-04-18T12:55:00Z
10
value 0.00035
scoring_system epss
scoring_elements 0.10458
published_at 2026-04-21T12:55:00Z
11
value 0.00035
scoring_system epss
scoring_elements 0.10444
published_at 2026-04-24T12:55:00Z
12
value 0.00039
scoring_system epss
scoring_elements 0.11359
published_at 2026-05-05T12:55:00Z
13
value 0.00039
scoring_system epss
scoring_elements 0.11502
published_at 2026-04-26T12:55:00Z
14
value 0.00039
scoring_system epss
scoring_elements 0.1143
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/
url https://support.apple.com/en-us/126794
6
reference_url https://support.apple.com/en-us/126798
reference_id 126798
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/
url https://support.apple.com/en-us/126798
7
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/
url https://support.apple.com/en-us/126799
8
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/
url https://support.apple.com/en-us/126800
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453003
reference_id 2453003
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453003
10
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
11
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
12
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
13
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
14
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-20691
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpvs-seby-kfhv
24
url VCID-gqjq-p4re-gkf6
vulnerability_id VCID-gqjq-p4re-gkf6
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43425
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10179
published_at 2026-04-07T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10283
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10285
published_at 2026-04-13T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10304
published_at 2026-04-12T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10345
published_at 2026-04-11T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10315
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10253
published_at 2026-04-08T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10752
published_at 2026-04-02T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.1444
published_at 2026-05-05T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14525
published_at 2026-04-16T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14531
published_at 2026-04-18T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14626
published_at 2026-04-24T12:55:00Z
12
value 0.00047
scoring_system epss
scoring_elements 0.14622
published_at 2026-04-26T12:55:00Z
13
value 0.00047
scoring_system epss
scoring_elements 0.14562
published_at 2026-04-29T12:55:00Z
14
value 0.00049
scoring_system epss
scoring_elements 0.14944
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43425
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416327
reference_id 2416327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416327
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43425
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqjq-p4re-gkf6
25
url VCID-gqm2-5nh3-7ufp
vulnerability_id VCID-gqm2-5nh3-7ufp
summary webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20665
reference_id
reference_type
scores
0
value 0.00157
scoring_system epss
scoring_elements 0.3659
published_at 2026-04-02T12:55:00Z
1
value 0.00157
scoring_system epss
scoring_elements 0.3622
published_at 2026-04-24T12:55:00Z
2
value 0.00157
scoring_system epss
scoring_elements 0.36448
published_at 2026-04-21T12:55:00Z
3
value 0.00157
scoring_system epss
scoring_elements 0.36504
published_at 2026-04-18T12:55:00Z
4
value 0.00157
scoring_system epss
scoring_elements 0.36521
published_at 2026-04-16T12:55:00Z
5
value 0.00157
scoring_system epss
scoring_elements 0.36479
published_at 2026-04-13T12:55:00Z
6
value 0.00157
scoring_system epss
scoring_elements 0.36502
published_at 2026-04-12T12:55:00Z
7
value 0.00157
scoring_system epss
scoring_elements 0.36537
published_at 2026-04-11T12:55:00Z
8
value 0.00157
scoring_system epss
scoring_elements 0.3653
published_at 2026-04-09T12:55:00Z
9
value 0.00157
scoring_system epss
scoring_elements 0.36511
published_at 2026-04-08T12:55:00Z
10
value 0.00157
scoring_system epss
scoring_elements 0.36623
published_at 2026-04-04T12:55:00Z
11
value 0.00157
scoring_system epss
scoring_elements 0.36459
published_at 2026-04-07T12:55:00Z
12
value 0.00171
scoring_system epss
scoring_elements 0.37908
published_at 2026-05-05T12:55:00Z
13
value 0.00171
scoring_system epss
scoring_elements 0.38116
published_at 2026-04-26T12:55:00Z
14
value 0.00171
scoring_system epss
scoring_elements 0.38022
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20665
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126793
reference_id 126793
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126793
6
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126794
7
reference_url https://support.apple.com/en-us/126797
reference_id 126797
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126797
8
reference_url https://support.apple.com/en-us/126798
reference_id 126798
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126798
9
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126799
10
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/
url https://support.apple.com/en-us/126800
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453002
reference_id 2453002
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453002
12
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
13
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
14
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
15
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
16
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-20665
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gqm2-5nh3-7ufp
26
url VCID-gwt6-n8ue-mqcf
vulnerability_id VCID-gwt6-n8ue-mqcf
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31277
reference_id
reference_type
scores
0
value 0.00171
scoring_system epss
scoring_elements 0.37888
published_at 2026-05-05T12:55:00Z
1
value 0.00171
scoring_system epss
scoring_elements 0.38121
published_at 2026-04-24T12:55:00Z
2
value 0.00171
scoring_system epss
scoring_elements 0.38097
published_at 2026-04-26T12:55:00Z
3
value 0.00171
scoring_system epss
scoring_elements 0.38004
published_at 2026-04-29T12:55:00Z
4
value 0.00176
scoring_system epss
scoring_elements 0.39139
published_at 2026-04-12T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39174
published_at 2026-04-16T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39173
published_at 2026-04-04T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39092
published_at 2026-04-07T12:55:00Z
8
value 0.00176
scoring_system epss
scoring_elements 0.39147
published_at 2026-04-08T12:55:00Z
9
value 0.00176
scoring_system epss
scoring_elements 0.39163
published_at 2026-04-09T12:55:00Z
10
value 0.00176
scoring_system epss
scoring_elements 0.39175
published_at 2026-04-11T12:55:00Z
11
value 0.00176
scoring_system epss
scoring_elements 0.3912
published_at 2026-04-13T12:55:00Z
12
value 0.00176
scoring_system epss
scoring_elements 0.39143
published_at 2026-04-18T12:55:00Z
13
value 0.00186
scoring_system epss
scoring_elements 0.40311
published_at 2026-04-21T12:55:00Z
14
value 0.00192
scoring_system epss
scoring_elements 0.4111
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31277
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448780
reference_id 2448780
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448780
11
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
12
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
13
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
14
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
15
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
16
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
17
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
18
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
19
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
20
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-31277
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gwt6-n8ue-mqcf
27
url VCID-hvj6-wsg9-1bhg
vulnerability_id VCID-hvj6-wsg9-1bhg
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43265
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.04829
published_at 2026-04-02T12:55:00Z
1
value 0.0002
scoring_system epss
scoring_elements 0.05422
published_at 2026-04-07T12:55:00Z
2
value 0.0002
scoring_system epss
scoring_elements 0.05478
published_at 2026-04-09T12:55:00Z
3
value 0.0002
scoring_system epss
scoring_elements 0.05457
published_at 2026-04-08T12:55:00Z
4
value 0.0002
scoring_system epss
scoring_elements 0.05414
published_at 2026-04-04T12:55:00Z
5
value 0.0002
scoring_system epss
scoring_elements 0.0543
published_at 2026-04-13T12:55:00Z
6
value 0.0002
scoring_system epss
scoring_elements 0.05436
published_at 2026-04-12T12:55:00Z
7
value 0.0002
scoring_system epss
scoring_elements 0.0545
published_at 2026-04-11T12:55:00Z
8
value 0.00027
scoring_system epss
scoring_elements 0.07746
published_at 2026-04-21T12:55:00Z
9
value 0.00027
scoring_system epss
scoring_elements 0.07596
published_at 2026-04-18T12:55:00Z
10
value 0.00027
scoring_system epss
scoring_elements 0.07608
published_at 2026-04-16T12:55:00Z
11
value 0.0003
scoring_system epss
scoring_elements 0.08591
published_at 2026-05-05T12:55:00Z
12
value 0.0003
scoring_system epss
scoring_elements 0.087
published_at 2026-04-24T12:55:00Z
13
value 0.0003
scoring_system epss
scoring_elements 0.08653
published_at 2026-04-26T12:55:00Z
14
value 0.0003
scoring_system epss
scoring_elements 0.08656
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43265
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386276
reference_id 2386276
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386276
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43265
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hvj6-wsg9-1bhg
28
url VCID-j31g-7h17-27c8
vulnerability_id VCID-j31g-7h17-27c8
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43541
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.13378
published_at 2026-04-02T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13443
published_at 2026-04-04T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.13239
published_at 2026-04-07T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.13321
published_at 2026-04-08T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13373
published_at 2026-04-09T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13342
published_at 2026-04-11T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13304
published_at 2026-04-12T12:55:00Z
7
value 0.00043
scoring_system epss
scoring_elements 0.13255
published_at 2026-04-13T12:55:00Z
8
value 0.00043
scoring_system epss
scoring_elements 0.1316
published_at 2026-04-16T12:55:00Z
9
value 0.00053
scoring_system epss
scoring_elements 0.16676
published_at 2026-04-18T12:55:00Z
10
value 0.00065
scoring_system epss
scoring_elements 0.20092
published_at 2026-04-29T12:55:00Z
11
value 0.00065
scoring_system epss
scoring_elements 0.20131
published_at 2026-04-24T12:55:00Z
12
value 0.00065
scoring_system epss
scoring_elements 0.20252
published_at 2026-04-21T12:55:00Z
13
value 0.00065
scoring_system epss
scoring_elements 0.20125
published_at 2026-04-26T12:55:00Z
14
value 0.00065
scoring_system epss
scoring_elements 0.20004
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43541
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125891
8
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/
url https://support.apple.com/en-us/125892
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423191
reference_id 2423191
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423191
10
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
11
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
12
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
13
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
14
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
15
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
16
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
17
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
18
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
19
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
20
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
21
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43541
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j31g-7h17-27c8
29
url VCID-jbuw-yp7v-4fcz
vulnerability_id VCID-jbuw-yp7v-4fcz
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31223
reference_id
reference_type
scores
0
value 0.00522
scoring_system epss
scoring_elements 0.66903
published_at 2026-05-05T12:55:00Z
1
value 0.00522
scoring_system epss
scoring_elements 0.66859
published_at 2026-04-04T12:55:00Z
2
value 0.00522
scoring_system epss
scoring_elements 0.66831
published_at 2026-04-07T12:55:00Z
3
value 0.00522
scoring_system epss
scoring_elements 0.66881
published_at 2026-04-08T12:55:00Z
4
value 0.00522
scoring_system epss
scoring_elements 0.66894
published_at 2026-04-09T12:55:00Z
5
value 0.00522
scoring_system epss
scoring_elements 0.66914
published_at 2026-04-11T12:55:00Z
6
value 0.00522
scoring_system epss
scoring_elements 0.669
published_at 2026-04-12T12:55:00Z
7
value 0.00522
scoring_system epss
scoring_elements 0.66868
published_at 2026-04-13T12:55:00Z
8
value 0.00522
scoring_system epss
scoring_elements 0.66901
published_at 2026-04-16T12:55:00Z
9
value 0.00522
scoring_system epss
scoring_elements 0.66915
published_at 2026-04-18T12:55:00Z
10
value 0.00522
scoring_system epss
scoring_elements 0.66897
published_at 2026-04-21T12:55:00Z
11
value 0.00522
scoring_system epss
scoring_elements 0.66922
published_at 2026-04-24T12:55:00Z
12
value 0.00522
scoring_system epss
scoring_elements 0.66935
published_at 2026-04-26T12:55:00Z
13
value 0.00522
scoring_system epss
scoring_elements 0.66933
published_at 2026-04-29T12:55:00Z
14
value 0.00534
scoring_system epss
scoring_elements 0.67378
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31223
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448779
reference_id 2448779
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448779
11
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
12
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
13
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
14
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
15
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
16
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
17
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
18
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
19
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
20
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-31223
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jbuw-yp7v-4fcz
30
url VCID-jyw2-fu8s-3fha
vulnerability_id VCID-jyw2-fu8s-3fha
summary Google Chrome: chromium: webkitgtk: Out of bounds memory access via crafted HTML page
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-14174
reference_id
reference_type
scores
0
value 0.00871
scoring_system epss
scoring_elements 0.75156
published_at 2026-04-02T12:55:00Z
1
value 0.00871
scoring_system epss
scoring_elements 0.7521
published_at 2026-04-09T12:55:00Z
2
value 0.00871
scoring_system epss
scoring_elements 0.75187
published_at 2026-04-04T12:55:00Z
3
value 0.00871
scoring_system epss
scoring_elements 0.75163
published_at 2026-04-07T12:55:00Z
4
value 0.00871
scoring_system epss
scoring_elements 0.75198
published_at 2026-04-08T12:55:00Z
5
value 0.0091
scoring_system epss
scoring_elements 0.75819
published_at 2026-04-12T12:55:00Z
6
value 0.0091
scoring_system epss
scoring_elements 0.75838
published_at 2026-04-11T12:55:00Z
7
value 0.01002
scoring_system epss
scoring_elements 0.77094
published_at 2026-04-29T12:55:00Z
8
value 0.01002
scoring_system epss
scoring_elements 0.77073
published_at 2026-04-24T12:55:00Z
9
value 0.01002
scoring_system epss
scoring_elements 0.77038
published_at 2026-04-21T12:55:00Z
10
value 0.01002
scoring_system epss
scoring_elements 0.7708
published_at 2026-04-26T12:55:00Z
11
value 0.01047
scoring_system epss
scoring_elements 0.77593
published_at 2026-05-05T12:55:00Z
12
value 0.01047
scoring_system epss
scoring_elements 0.77501
published_at 2026-04-13T12:55:00Z
13
value 0.01047
scoring_system epss
scoring_elements 0.77539
published_at 2026-04-16T12:55:00Z
14
value 0.01047
scoring_system epss
scoring_elements 0.77536
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-14174
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2421824
reference_id 2421824
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2421824
5
reference_url https://issues.chromium.org/issues/466192044
reference_id 466192044
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/
url https://issues.chromium.org/issues/466192044
6
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
7
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
8
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
9
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
10
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
11
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
12
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
13
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
14
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
15
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
16
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
17
reference_url https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html
reference_id stable-channel-update-for-desktop_10.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/
url https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html
18
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-14174
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jyw2-fu8s-3fha
31
url VCID-kx6w-wbua-5ffr
vulnerability_id VCID-kx6w-wbua-5ffr
summary webkitgtk: A website may be able to access sensor information without user consent
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43356
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15335
published_at 2026-04-04T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15278
published_at 2026-04-09T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15227
published_at 2026-04-08T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15139
published_at 2026-04-07T12:55:00Z
4
value 0.00053
scoring_system epss
scoring_elements 0.16805
published_at 2026-04-02T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.16491
published_at 2026-05-05T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.16765
published_at 2026-04-21T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.1667
published_at 2026-04-24T12:55:00Z
8
value 0.00054
scoring_system epss
scoring_elements 0.16658
published_at 2026-04-26T12:55:00Z
9
value 0.00054
scoring_system epss
scoring_elements 0.16624
published_at 2026-04-29T12:55:00Z
10
value 0.00056
scoring_system epss
scoring_elements 0.17708
published_at 2026-04-11T12:55:00Z
11
value 0.00056
scoring_system epss
scoring_elements 0.17565
published_at 2026-04-18T12:55:00Z
12
value 0.00056
scoring_system epss
scoring_elements 0.17557
published_at 2026-04-16T12:55:00Z
13
value 0.00056
scoring_system epss
scoring_elements 0.17611
published_at 2026-04-13T12:55:00Z
14
value 0.00056
scoring_system epss
scoring_elements 0.17662
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43356
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125109
reference_id 125109
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125109
6
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125113
7
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125114
8
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125115
9
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/
url https://support.apple.com/en-us/125116
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397628
reference_id 2397628
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397628
11
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
12
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
13
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
14
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
15
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
16
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
17
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
18
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
19
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
20
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
21
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
22
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43356
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kx6w-wbua-5ffr
32
url VCID-m59e-8bgm-77he
vulnerability_id VCID-m59e-8bgm-77he
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43343
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.35082
published_at 2026-04-02T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.35109
published_at 2026-04-04T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.34988
published_at 2026-04-07T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35033
published_at 2026-04-08T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.35061
published_at 2026-04-09T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.3798
published_at 2026-04-11T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.37963
published_at 2026-04-16T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.37917
published_at 2026-04-13T12:55:00Z
8
value 0.00168
scoring_system epss
scoring_elements 0.37942
published_at 2026-04-18T12:55:00Z
9
value 0.00217
scoring_system epss
scoring_elements 0.44222
published_at 2026-04-24T12:55:00Z
10
value 0.00217
scoring_system epss
scoring_elements 0.44225
published_at 2026-04-26T12:55:00Z
11
value 0.00217
scoring_system epss
scoring_elements 0.44143
published_at 2026-04-29T12:55:00Z
12
value 0.00217
scoring_system epss
scoring_elements 0.44022
published_at 2026-05-05T12:55:00Z
13
value 0.00217
scoring_system epss
scoring_elements 0.44308
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43343
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125110
reference_id 125110
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125110
6
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125113
7
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125114
8
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125115
9
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/
url https://support.apple.com/en-us/125116
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2403598
reference_id 2403598
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2403598
11
reference_url https://access.redhat.com/errata/RHSA-2025:18070
reference_id RHSA-2025:18070
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18070
12
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
13
reference_url https://access.redhat.com/errata/RHSA-2025:19913
reference_id RHSA-2025:19913
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19913
14
reference_url https://access.redhat.com/errata/RHSA-2025:19914
reference_id RHSA-2025:19914
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19914
15
reference_url https://access.redhat.com/errata/RHSA-2025:19915
reference_id RHSA-2025:19915
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19915
16
reference_url https://access.redhat.com/errata/RHSA-2025:19916
reference_id RHSA-2025:19916
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19916
17
reference_url https://access.redhat.com/errata/RHSA-2025:19918
reference_id RHSA-2025:19918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19918
18
reference_url https://access.redhat.com/errata/RHSA-2025:19919
reference_id RHSA-2025:19919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19919
19
reference_url https://access.redhat.com/errata/RHSA-2025:19920
reference_id RHSA-2025:19920
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19920
20
reference_url https://access.redhat.com/errata/RHSA-2025:19946
reference_id RHSA-2025:19946
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19946
21
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
22
reference_url https://usn.ubuntu.com/7895-1/
reference_id USN-7895-1
reference_type
scores
url https://usn.ubuntu.com/7895-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43343
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m59e-8bgm-77he
33
url VCID-mfg4-2ma4-3qgj
vulnerability_id VCID-mfg4-2ma4-3qgj
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43434
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10558
published_at 2026-04-07T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10647
published_at 2026-04-13T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10671
published_at 2026-04-12T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10703
published_at 2026-04-11T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10689
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.1063
published_at 2026-04-08T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-02T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14896
published_at 2026-05-05T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14981
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14991
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.1508
published_at 2026-04-24T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.15081
published_at 2026-04-26T12:55:00Z
13
value 0.00049
scoring_system epss
scoring_elements 0.15025
published_at 2026-04-29T12:55:00Z
14
value 0.0005
scoring_system epss
scoring_elements 0.15473
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416335
reference_id 2416335
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416335
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43434
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfg4-2ma4-3qgj
34
url VCID-mhfm-j5xm-wybd
vulnerability_id VCID-mhfm-j5xm-wybd
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43431
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.12936
published_at 2026-04-07T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13133
published_at 2026-04-04T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.12942
published_at 2026-04-13T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.12988
published_at 2026-04-12T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13027
published_at 2026-04-11T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13065
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13015
published_at 2026-04-08T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13656
published_at 2026-04-02T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20153
published_at 2026-05-05T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20413
published_at 2026-04-18T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.20284
published_at 2026-04-24T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.20279
published_at 2026-04-26T12:55:00Z
12
value 0.00066
scoring_system epss
scoring_elements 0.20244
published_at 2026-04-29T12:55:00Z
13
value 0.00068
scoring_system epss
scoring_elements 0.20796
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43431
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416332
reference_id 2416332
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416332
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43431
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mhfm-j5xm-wybd
35
url VCID-mmcp-4qnx-5ufh
vulnerability_id VCID-mmcp-4qnx-5ufh
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20635
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15424
published_at 2026-04-02T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.15212
published_at 2026-04-18T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.15207
published_at 2026-04-16T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.15291
published_at 2026-04-13T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15357
published_at 2026-04-12T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.15396
published_at 2026-04-11T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15435
published_at 2026-04-09T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15385
published_at 2026-04-08T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15493
published_at 2026-04-04T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.15297
published_at 2026-04-07T12:55:00Z
10
value 0.00083
scoring_system epss
scoring_elements 0.2393
published_at 2026-05-05T12:55:00Z
11
value 0.00083
scoring_system epss
scoring_elements 0.24221
published_at 2026-04-21T12:55:00Z
12
value 0.00083
scoring_system epss
scoring_elements 0.24098
published_at 2026-04-24T12:55:00Z
13
value 0.00083
scoring_system epss
scoring_elements 0.24085
published_at 2026-04-26T12:55:00Z
14
value 0.00083
scoring_system epss
scoring_elements 0.24043
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20635
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126351
reference_id 126351
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126351
8
reference_url https://support.apple.com/en-us/126352
reference_id 126352
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126352
9
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126353
10
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/
url https://support.apple.com/en-us/126354
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448790
reference_id 2448790
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448790
12
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
13
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
14
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
15
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
16
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-20635
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mmcp-4qnx-5ufh
36
url VCID-nmvc-maj7-rfhm
vulnerability_id VCID-nmvc-maj7-rfhm
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43536
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18813
published_at 2026-04-02T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18588
published_at 2026-04-07T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18866
published_at 2026-04-04T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18667
published_at 2026-04-08T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18723
published_at 2026-04-09T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18728
published_at 2026-04-11T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18681
published_at 2026-04-12T12:55:00Z
7
value 0.0006
scoring_system epss
scoring_elements 0.1863
published_at 2026-04-13T12:55:00Z
8
value 0.0006
scoring_system epss
scoring_elements 0.18574
published_at 2026-04-16T12:55:00Z
9
value 0.00085
scoring_system epss
scoring_elements 0.24416
published_at 2026-04-29T12:55:00Z
10
value 0.00085
scoring_system epss
scoring_elements 0.2429
published_at 2026-05-05T12:55:00Z
11
value 0.00085
scoring_system epss
scoring_elements 0.24471
published_at 2026-04-24T12:55:00Z
12
value 0.00085
scoring_system epss
scoring_elements 0.24457
published_at 2026-04-26T12:55:00Z
13
value 0.00085
scoring_system epss
scoring_elements 0.24551
published_at 2026-04-18T12:55:00Z
14
value 0.00085
scoring_system epss
scoring_elements 0.24527
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43536
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/
url https://support.apple.com/en-us/125892
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423190
reference_id 2423190
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423190
9
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
10
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
11
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
12
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
13
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
14
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
15
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
16
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
17
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
18
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
19
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
20
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43536
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nmvc-maj7-rfhm
37
url VCID-nu9v-3xak-77aw
vulnerability_id VCID-nu9v-3xak-77aw
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43240
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08273
published_at 2026-04-02T12:55:00Z
1
value 0.00032
scoring_system epss
scoring_elements 0.09161
published_at 2026-04-11T12:55:00Z
2
value 0.00032
scoring_system epss
scoring_elements 0.0913
published_at 2026-04-08T12:55:00Z
3
value 0.00032
scoring_system epss
scoring_elements 0.0905
published_at 2026-04-07T12:55:00Z
4
value 0.00032
scoring_system epss
scoring_elements 0.09128
published_at 2026-04-12T12:55:00Z
5
value 0.00032
scoring_system epss
scoring_elements 0.09114
published_at 2026-04-13T12:55:00Z
6
value 0.00057
scoring_system epss
scoring_elements 0.17722
published_at 2026-04-21T12:55:00Z
7
value 0.00057
scoring_system epss
scoring_elements 0.17674
published_at 2026-04-16T12:55:00Z
8
value 0.00057
scoring_system epss
scoring_elements 0.17683
published_at 2026-04-18T12:55:00Z
9
value 0.00091
scoring_system epss
scoring_elements 0.2539
published_at 2026-05-05T12:55:00Z
10
value 0.00091
scoring_system epss
scoring_elements 0.25562
published_at 2026-04-24T12:55:00Z
11
value 0.00091
scoring_system epss
scoring_elements 0.25554
published_at 2026-04-26T12:55:00Z
12
value 0.00091
scoring_system epss
scoring_elements 0.25504
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43240
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/
url https://support.apple.com/en-us/124149
5
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/
url https://support.apple.com/en-us/124152
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2384385
reference_id 2384385
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2384385
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
9
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
10
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
11
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
12
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
13
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
14
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
15
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
16
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
17
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
18
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43240
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nu9v-3xak-77aw
38
url VCID-nwkr-s7vs-p7fz
vulnerability_id VCID-nwkr-s7vs-p7fz
summary webkitgtk: Processing maliciously crafted web content may bypass Same Origin Policy
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20643
reference_id
reference_type
scores
0
value 0.00034
scoring_system epss
scoring_elements 0.09744
published_at 2026-04-02T12:55:00Z
1
value 0.00034
scoring_system epss
scoring_elements 0.09655
published_at 2026-04-16T12:55:00Z
2
value 0.00034
scoring_system epss
scoring_elements 0.09771
published_at 2026-04-13T12:55:00Z
3
value 0.00034
scoring_system epss
scoring_elements 0.09788
published_at 2026-04-12T12:55:00Z
4
value 0.00034
scoring_system epss
scoring_elements 0.0982
published_at 2026-04-11T12:55:00Z
5
value 0.00034
scoring_system epss
scoring_elements 0.0981
published_at 2026-04-09T12:55:00Z
6
value 0.00034
scoring_system epss
scoring_elements 0.0976
published_at 2026-04-08T12:55:00Z
7
value 0.00034
scoring_system epss
scoring_elements 0.09793
published_at 2026-04-04T12:55:00Z
8
value 0.00034
scoring_system epss
scoring_elements 0.09689
published_at 2026-04-07T12:55:00Z
9
value 0.00037
scoring_system epss
scoring_elements 0.10705
published_at 2026-05-05T12:55:00Z
10
value 0.00037
scoring_system epss
scoring_elements 0.10783
published_at 2026-04-18T12:55:00Z
11
value 0.00037
scoring_system epss
scoring_elements 0.10904
published_at 2026-04-21T12:55:00Z
12
value 0.00037
scoring_system epss
scoring_elements 0.10864
published_at 2026-04-24T12:55:00Z
13
value 0.00037
scoring_system epss
scoring_elements 0.10823
published_at 2026-04-26T12:55:00Z
14
value 0.00037
scoring_system epss
scoring_elements 0.10762
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20643
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126604
reference_id 126604
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126604
5
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126792
6
reference_url https://support.apple.com/en-us/126793
reference_id 126793
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126793
7
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126794
8
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126799
9
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/
url https://support.apple.com/en-us/126800
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453000
reference_id 2453000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453000
11
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
12
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
13
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
14
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
15
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-20643
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nwkr-s7vs-p7fz
39
url VCID-p84d-5ze6-9fb5
vulnerability_id VCID-p84d-5ze6-9fb5
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43228
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.1092
published_at 2026-04-02T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12105
published_at 2026-04-09T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.1217
published_at 2026-04-04T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.11971
published_at 2026-04-07T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12053
published_at 2026-04-08T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12112
published_at 2026-04-11T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12075
published_at 2026-04-12T12:55:00Z
7
value 0.0004
scoring_system epss
scoring_elements 0.12046
published_at 2026-04-13T12:55:00Z
8
value 0.00059
scoring_system epss
scoring_elements 0.18433
published_at 2026-04-21T12:55:00Z
9
value 0.00059
scoring_system epss
scoring_elements 0.18399
published_at 2026-04-16T12:55:00Z
10
value 0.00059
scoring_system epss
scoring_elements 0.18412
published_at 2026-04-18T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.20062
published_at 2026-05-05T12:55:00Z
12
value 0.00066
scoring_system epss
scoring_elements 0.20187
published_at 2026-04-24T12:55:00Z
13
value 0.00066
scoring_system epss
scoring_elements 0.20182
published_at 2026-04-26T12:55:00Z
14
value 0.00066
scoring_system epss
scoring_elements 0.20148
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43228
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/
url https://support.apple.com/en-us/124152
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386275
reference_id 2386275
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386275
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43228
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-p84d-5ze6-9fb5
40
url VCID-ph63-r178-pfgg
vulnerability_id VCID-ph63-r178-pfgg
summary webkitgtk: webkitgtk: Use-after-free due to improper memory management
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43529
reference_id
reference_type
scores
0
value 0.00125
scoring_system epss
scoring_elements 0.31787
published_at 2026-04-02T12:55:00Z
1
value 0.00125
scoring_system epss
scoring_elements 0.31831
published_at 2026-04-04T12:55:00Z
2
value 0.00125
scoring_system epss
scoring_elements 0.31731
published_at 2026-04-09T12:55:00Z
3
value 0.00125
scoring_system epss
scoring_elements 0.31702
published_at 2026-04-08T12:55:00Z
4
value 0.00125
scoring_system epss
scoring_elements 0.3165
published_at 2026-04-07T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34624
published_at 2026-04-21T12:55:00Z
6
value 0.00152
scoring_system epss
scoring_elements 0.35911
published_at 2026-04-16T12:55:00Z
7
value 0.00152
scoring_system epss
scoring_elements 0.35872
published_at 2026-04-13T12:55:00Z
8
value 0.00152
scoring_system epss
scoring_elements 0.35896
published_at 2026-04-12T12:55:00Z
9
value 0.00152
scoring_system epss
scoring_elements 0.35936
published_at 2026-04-11T12:55:00Z
10
value 0.00167
scoring_system epss
scoring_elements 0.37587
published_at 2026-04-24T12:55:00Z
11
value 0.00167
scoring_system epss
scoring_elements 0.37475
published_at 2026-04-29T12:55:00Z
12
value 0.00167
scoring_system epss
scoring_elements 0.37564
published_at 2026-04-26T12:55:00Z
13
value 0.00175
scoring_system epss
scoring_elements 0.39005
published_at 2026-04-18T12:55:00Z
14
value 0.00215
scoring_system epss
scoring_elements 0.43775
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125889
reference_id 125889
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125889
8
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125890
9
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125891
10
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/
url https://support.apple.com/en-us/125892
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423166
reference_id 2423166
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423166
12
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
13
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
14
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
15
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
16
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
17
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
18
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
19
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
20
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
21
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
22
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
23
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43529
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ph63-r178-pfgg
41
url VCID-pwqw-z8jj-abfs
vulnerability_id VCID-pwqw-z8jj-abfs
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43440
reference_id
reference_type
scores
0
value 0.0004
scoring_system epss
scoring_elements 0.12027
published_at 2026-04-07T12:55:00Z
1
value 0.0004
scoring_system epss
scoring_elements 0.12226
published_at 2026-04-04T12:55:00Z
2
value 0.0004
scoring_system epss
scoring_elements 0.12099
published_at 2026-04-13T12:55:00Z
3
value 0.0004
scoring_system epss
scoring_elements 0.12131
published_at 2026-04-12T12:55:00Z
4
value 0.0004
scoring_system epss
scoring_elements 0.12168
published_at 2026-04-11T12:55:00Z
5
value 0.0004
scoring_system epss
scoring_elements 0.12161
published_at 2026-04-09T12:55:00Z
6
value 0.0004
scoring_system epss
scoring_elements 0.12109
published_at 2026-04-08T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.13044
published_at 2026-04-02T12:55:00Z
8
value 0.00062
scoring_system epss
scoring_elements 0.18908
published_at 2026-05-05T12:55:00Z
9
value 0.00062
scoring_system epss
scoring_elements 0.19171
published_at 2026-04-16T12:55:00Z
10
value 0.00062
scoring_system epss
scoring_elements 0.1918
published_at 2026-04-18T12:55:00Z
11
value 0.00062
scoring_system epss
scoring_elements 0.19081
published_at 2026-04-24T12:55:00Z
12
value 0.00062
scoring_system epss
scoring_elements 0.19072
published_at 2026-04-26T12:55:00Z
13
value 0.00062
scoring_system epss
scoring_elements 0.19027
published_at 2026-04-29T12:55:00Z
14
value 0.00063
scoring_system epss
scoring_elements 0.19628
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43440
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416336
reference_id 2416336
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416336
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43440
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pwqw-z8jj-abfs
42
url VCID-qytm-81jk-muhc
vulnerability_id VCID-qytm-81jk-muhc
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43432
reference_id
reference_type
scores
0
value 0.00035
scoring_system epss
scoring_elements 0.10179
published_at 2026-04-07T12:55:00Z
1
value 0.00035
scoring_system epss
scoring_elements 0.10283
published_at 2026-04-04T12:55:00Z
2
value 0.00035
scoring_system epss
scoring_elements 0.10285
published_at 2026-04-13T12:55:00Z
3
value 0.00035
scoring_system epss
scoring_elements 0.10304
published_at 2026-04-12T12:55:00Z
4
value 0.00035
scoring_system epss
scoring_elements 0.10345
published_at 2026-04-11T12:55:00Z
5
value 0.00035
scoring_system epss
scoring_elements 0.10315
published_at 2026-04-09T12:55:00Z
6
value 0.00035
scoring_system epss
scoring_elements 0.10253
published_at 2026-04-08T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10752
published_at 2026-04-02T12:55:00Z
8
value 0.00047
scoring_system epss
scoring_elements 0.1444
published_at 2026-05-05T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14525
published_at 2026-04-16T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14531
published_at 2026-04-18T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14626
published_at 2026-04-24T12:55:00Z
12
value 0.00047
scoring_system epss
scoring_elements 0.14622
published_at 2026-04-26T12:55:00Z
13
value 0.00047
scoring_system epss
scoring_elements 0.14562
published_at 2026-04-29T12:55:00Z
14
value 0.00049
scoring_system epss
scoring_elements 0.14944
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43432
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416334
reference_id 2416334
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416334
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
22
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43432
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qytm-81jk-muhc
43
url VCID-r857-ke39-xug8
vulnerability_id VCID-r857-ke39-xug8
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43227
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32854
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.34632
published_at 2026-04-07T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.34704
published_at 2026-04-09T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34676
published_at 2026-04-08T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34755
published_at 2026-04-04T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34644
published_at 2026-04-13T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34668
published_at 2026-04-12T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34707
published_at 2026-04-11T12:55:00Z
8
value 0.00214
scoring_system epss
scoring_elements 0.43889
published_at 2026-04-21T12:55:00Z
9
value 0.00214
scoring_system epss
scoring_elements 0.43957
published_at 2026-04-18T12:55:00Z
10
value 0.00214
scoring_system epss
scoring_elements 0.43966
published_at 2026-04-16T12:55:00Z
11
value 0.00238
scoring_system epss
scoring_elements 0.46743
published_at 2026-05-05T12:55:00Z
12
value 0.00238
scoring_system epss
scoring_elements 0.46873
published_at 2026-04-24T12:55:00Z
13
value 0.00238
scoring_system epss
scoring_elements 0.46884
published_at 2026-04-26T12:55:00Z
14
value 0.00238
scoring_system epss
scoring_elements 0.46833
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43227
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386274
reference_id 2386274
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386274
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
13
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
14
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
15
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
16
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
17
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
18
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
19
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
20
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
21
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
22
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43227
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r857-ke39-xug8
44
url VCID-stjs-xknd-zfgh
vulnerability_id VCID-stjs-xknd-zfgh
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-66287
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14092
published_at 2026-05-05T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21619
published_at 2026-04-02T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21677
published_at 2026-04-04T12:55:00Z
3
value 0.001
scoring_system epss
scoring_elements 0.27562
published_at 2026-04-21T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27338
published_at 2026-04-29T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.27415
published_at 2026-04-26T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27521
published_at 2026-04-24T12:55:00Z
7
value 0.001
scoring_system epss
scoring_elements 0.27604
published_at 2026-04-07T12:55:00Z
8
value 0.001
scoring_system epss
scoring_elements 0.27671
published_at 2026-04-08T12:55:00Z
9
value 0.001
scoring_system epss
scoring_elements 0.27714
published_at 2026-04-09T12:55:00Z
10
value 0.001
scoring_system epss
scoring_elements 0.27719
published_at 2026-04-11T12:55:00Z
11
value 0.001
scoring_system epss
scoring_elements 0.27675
published_at 2026-04-12T12:55:00Z
12
value 0.001
scoring_system epss
scoring_elements 0.27617
published_at 2026-04-13T12:55:00Z
13
value 0.001
scoring_system epss
scoring_elements 0.27626
published_at 2026-04-16T12:55:00Z
14
value 0.001
scoring_system epss
scoring_elements 0.276
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-66287
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2418857
reference_id 2418857
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2418857
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
22
reference_url https://access.redhat.com/security/cve/CVE-2025-66287
reference_id CVE-2025-66287
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/security/cve/CVE-2025-66287
23
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:22789
24
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:22790
25
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23110
26
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23433
27
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23434
28
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23451
29
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23452
30
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23583
31
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23591
32
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23742
33
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://access.redhat.com/errata/RHSA-2025:23743
34
reference_url https://usn.ubuntu.com/7941-1/
reference_id USN-7941-1
reference_type
scores
url https://usn.ubuntu.com/7941-1/
35
reference_url https://webkitgtk.org/security/WSA-2025-0009.html
reference_id WSA-2025-0009.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/
url https://webkitgtk.org/security/WSA-2025-0009.html
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-66287
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-stjs-xknd-zfgh
45
url VCID-t46t-rhgu-cbc1
vulnerability_id VCID-t46t-rhgu-cbc1
summary webkitgtk: A website may be able to track users through Safari web extensions
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20676
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10606
published_at 2026-04-07T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10683
published_at 2026-04-02T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10747
published_at 2026-04-04T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10679
published_at 2026-04-08T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10735
published_at 2026-04-09T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10749
published_at 2026-04-11T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.10718
published_at 2026-04-12T12:55:00Z
7
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-13T12:55:00Z
8
value 0.00036
scoring_system epss
scoring_elements 0.10555
published_at 2026-04-16T12:55:00Z
9
value 0.00036
scoring_system epss
scoring_elements 0.10572
published_at 2026-04-18T12:55:00Z
10
value 0.00052
scoring_system epss
scoring_elements 0.15918
published_at 2026-05-05T12:55:00Z
11
value 0.00052
scoring_system epss
scoring_elements 0.16078
published_at 2026-04-24T12:55:00Z
12
value 0.00052
scoring_system epss
scoring_elements 0.16075
published_at 2026-04-26T12:55:00Z
13
value 0.00052
scoring_system epss
scoring_elements 0.16036
published_at 2026-04-29T12:55:00Z
14
value 0.00052
scoring_system epss
scoring_elements 0.16188
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20676
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126348
6
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126353
7
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/
url https://support.apple.com/en-us/126354
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448794
reference_id 2448794
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448794
9
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
10
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
11
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
12
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
13
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-20676
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t46t-rhgu-cbc1
46
url VCID-teue-y6qz-jyfw
vulnerability_id VCID-teue-y6qz-jyfw
summary webkitgtk: Processing maliciously crafted web content may disclose internal states of the app
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-46299
reference_id
reference_type
scores
0
value 0.00023
scoring_system epss
scoring_elements 0.0601
published_at 2026-04-02T12:55:00Z
1
value 0.00023
scoring_system epss
scoring_elements 0.06283
published_at 2026-05-05T12:55:00Z
2
value 0.00023
scoring_system epss
scoring_elements 0.06046
published_at 2026-04-04T12:55:00Z
3
value 0.00023
scoring_system epss
scoring_elements 0.0603
published_at 2026-04-07T12:55:00Z
4
value 0.00023
scoring_system epss
scoring_elements 0.0607
published_at 2026-04-08T12:55:00Z
5
value 0.00023
scoring_system epss
scoring_elements 0.06109
published_at 2026-04-09T12:55:00Z
6
value 0.00023
scoring_system epss
scoring_elements 0.061
published_at 2026-04-11T12:55:00Z
7
value 0.00023
scoring_system epss
scoring_elements 0.06094
published_at 2026-04-12T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06086
published_at 2026-04-13T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06051
published_at 2026-04-16T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06061
published_at 2026-04-18T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.0621
published_at 2026-04-21T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06224
published_at 2026-04-24T12:55:00Z
13
value 0.00023
scoring_system epss
scoring_elements 0.06255
published_at 2026-04-26T12:55:00Z
14
value 0.00023
scoring_system epss
scoring_elements 0.06264
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-46299
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125886
6
reference_url https://support.apple.com/en-us/125889
reference_id 125889
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125889
7
reference_url https://support.apple.com/en-us/125890
reference_id 125890
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125890
8
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125891
9
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/
url https://support.apple.com/en-us/125892
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448788
reference_id 2448788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448788
11
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
12
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
13
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
14
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
15
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-46299
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-teue-y6qz-jyfw
47
url VCID-u6k6-1hmc-tfaf
vulnerability_id VCID-u6k6-1hmc-tfaf
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43427
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19732
published_at 2026-04-04T12:55:00Z
1
value 0.00063
scoring_system epss
scoring_elements 0.19456
published_at 2026-04-07T12:55:00Z
2
value 0.00063
scoring_system epss
scoring_elements 0.19535
published_at 2026-04-08T12:55:00Z
3
value 0.00063
scoring_system epss
scoring_elements 0.19587
published_at 2026-04-09T12:55:00Z
4
value 0.00063
scoring_system epss
scoring_elements 0.1959
published_at 2026-04-11T12:55:00Z
5
value 0.00063
scoring_system epss
scoring_elements 0.19542
published_at 2026-04-12T12:55:00Z
6
value 0.00063
scoring_system epss
scoring_elements 0.19484
published_at 2026-04-13T12:55:00Z
7
value 0.00064
scoring_system epss
scoring_elements 0.19862
published_at 2026-04-24T12:55:00Z
8
value 0.00064
scoring_system epss
scoring_elements 0.19826
published_at 2026-04-29T12:55:00Z
9
value 0.00064
scoring_system epss
scoring_elements 0.19975
published_at 2026-04-18T12:55:00Z
10
value 0.00064
scoring_system epss
scoring_elements 0.19857
published_at 2026-04-26T12:55:00Z
11
value 0.00064
scoring_system epss
scoring_elements 0.19971
published_at 2026-04-16T12:55:00Z
12
value 0.00064
scoring_system epss
scoring_elements 0.19731
published_at 2026-05-05T12:55:00Z
13
value 0.00065
scoring_system epss
scoring_elements 0.20366
published_at 2026-04-02T12:55:00Z
14
value 0.00066
scoring_system epss
scoring_elements 0.20378
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/
url https://support.apple.com/en-us/125640
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416329
reference_id 2416329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416329
10
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
11
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
12
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
13
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
14
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
15
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
16
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
17
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
18
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
19
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
20
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
21
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43427
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u6k6-1hmc-tfaf
48
url VCID-unu1-sbnm-27bf
vulnerability_id VCID-unu1-sbnm-27bf
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43433
reference_id
reference_type
scores
0
value 0.00043
scoring_system epss
scoring_elements 0.12936
published_at 2026-04-07T12:55:00Z
1
value 0.00043
scoring_system epss
scoring_elements 0.13133
published_at 2026-04-04T12:55:00Z
2
value 0.00043
scoring_system epss
scoring_elements 0.12942
published_at 2026-04-13T12:55:00Z
3
value 0.00043
scoring_system epss
scoring_elements 0.12988
published_at 2026-04-12T12:55:00Z
4
value 0.00043
scoring_system epss
scoring_elements 0.13027
published_at 2026-04-11T12:55:00Z
5
value 0.00043
scoring_system epss
scoring_elements 0.13065
published_at 2026-04-09T12:55:00Z
6
value 0.00043
scoring_system epss
scoring_elements 0.13015
published_at 2026-04-08T12:55:00Z
7
value 0.00045
scoring_system epss
scoring_elements 0.14014
published_at 2026-04-02T12:55:00Z
8
value 0.00066
scoring_system epss
scoring_elements 0.20153
published_at 2026-05-05T12:55:00Z
9
value 0.00066
scoring_system epss
scoring_elements 0.20413
published_at 2026-04-18T12:55:00Z
10
value 0.00066
scoring_system epss
scoring_elements 0.2041
published_at 2026-04-21T12:55:00Z
11
value 0.00066
scoring_system epss
scoring_elements 0.20284
published_at 2026-04-24T12:55:00Z
12
value 0.00066
scoring_system epss
scoring_elements 0.20279
published_at 2026-04-26T12:55:00Z
13
value 0.00066
scoring_system epss
scoring_elements 0.20244
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43433
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448783
reference_id 2448783
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448783
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43433
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-unu1-sbnm-27bf
49
url VCID-vk4e-qufz-5ffp
vulnerability_id VCID-vk4e-qufz-5ffp
summary angle: insufficient input validation can cause undefined behavior
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-6558
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37993
published_at 2026-04-08T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.38004
published_at 2026-04-16T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.38021
published_at 2026-04-11T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.37984
published_at 2026-04-18T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37959
published_at 2026-04-13T12:55:00Z
5
value 0.00218
scoring_system epss
scoring_elements 0.44401
published_at 2026-04-21T12:55:00Z
6
value 0.00218
scoring_system epss
scoring_elements 0.44447
published_at 2026-04-04T12:55:00Z
7
value 0.00218
scoring_system epss
scoring_elements 0.44381
published_at 2026-04-07T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.44426
published_at 2026-04-02T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.44299
published_at 2026-04-24T12:55:00Z
10
value 0.00218
scoring_system epss
scoring_elements 0.44302
published_at 2026-04-26T12:55:00Z
11
value 0.00218
scoring_system epss
scoring_elements 0.44219
published_at 2026-04-29T12:55:00Z
12
value 0.00218
scoring_system epss
scoring_elements 0.44092
published_at 2026-05-05T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-6558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2380254
reference_id 2380254
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2380254
5
reference_url https://issues.chromium.org/issues/427162086
reference_id 427162086
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/
url https://issues.chromium.org/issues/427162086
6
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
7
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
8
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
9
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
10
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
11
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
12
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
13
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
14
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
15
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
16
reference_url https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html
reference_id stable-channel-update-for-desktop_15.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/
url https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html
17
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-6558
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vk4e-qufz-5ffp
50
url VCID-w3r3-11kt-2ydu
vulnerability_id VCID-w3r3-11kt-2ydu
summary webkitgtk: A website may exfiltrate image data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43392
reference_id
reference_type
scores
0
value 0.0003
scoring_system epss
scoring_elements 0.08567
published_at 2026-04-07T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08649
published_at 2026-04-04T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08627
published_at 2026-04-13T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.08639
published_at 2026-04-12T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08662
published_at 2026-04-11T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08664
published_at 2026-04-09T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.0864
published_at 2026-04-08T12:55:00Z
7
value 0.00031
scoring_system epss
scoring_elements 0.08987
published_at 2026-04-02T12:55:00Z
8
value 0.00041
scoring_system epss
scoring_elements 0.12255
published_at 2026-05-05T12:55:00Z
9
value 0.00041
scoring_system epss
scoring_elements 0.12365
published_at 2026-04-16T12:55:00Z
10
value 0.00041
scoring_system epss
scoring_elements 0.12367
published_at 2026-04-18T12:55:00Z
11
value 0.00041
scoring_system epss
scoring_elements 0.12483
published_at 2026-04-21T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12488
published_at 2026-04-24T12:55:00Z
13
value 0.00041
scoring_system epss
scoring_elements 0.12457
published_at 2026-04-26T12:55:00Z
14
value 0.00041
scoring_system epss
scoring_elements 0.12346
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43392
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125639
10
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/
url https://support.apple.com/en-us/125640
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416325
reference_id 2416325
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416325
12
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
13
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
14
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
15
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
16
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
17
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
18
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
19
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
20
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
21
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
22
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
23
reference_url https://usn.ubuntu.com/7914-1/
reference_id USN-7914-1
reference_type
scores
url https://usn.ubuntu.com/7914-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43392
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w3r3-11kt-2ydu
51
url VCID-w5gq-k53s-tuc5
vulnerability_id VCID-w5gq-k53s-tuc5
summary webkitgtk: A remote attacker may be able to cause a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20652
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.38025
published_at 2026-04-02T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37947
published_at 2026-04-13T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.37972
published_at 2026-04-18T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.38009
published_at 2026-04-11T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37992
published_at 2026-04-16T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37981
published_at 2026-04-08T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.38051
published_at 2026-04-04T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.3793
published_at 2026-04-07T12:55:00Z
8
value 0.00255
scoring_system epss
scoring_elements 0.48695
published_at 2026-05-05T12:55:00Z
9
value 0.00255
scoring_system epss
scoring_elements 0.48832
published_at 2026-04-21T12:55:00Z
10
value 0.00255
scoring_system epss
scoring_elements 0.4882
published_at 2026-04-24T12:55:00Z
11
value 0.00255
scoring_system epss
scoring_elements 0.48829
published_at 2026-04-26T12:55:00Z
12
value 0.00255
scoring_system epss
scoring_elements 0.4878
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20652
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126353
8
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/
url https://support.apple.com/en-us/126354
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448793
reference_id 2448793
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448793
10
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
11
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
12
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
13
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
14
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-20652
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w5gq-k53s-tuc5
52
url VCID-whma-xbxr-5uay
vulnerability_id VCID-whma-xbxr-5uay
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43342
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52326
published_at 2026-04-02T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.52355
published_at 2026-04-04T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52366
published_at 2026-04-09T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.5237
published_at 2026-04-08T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52317
published_at 2026-04-07T12:55:00Z
5
value 0.00332
scoring_system epss
scoring_elements 0.56104
published_at 2026-04-12T12:55:00Z
6
value 0.00332
scoring_system epss
scoring_elements 0.56127
published_at 2026-04-11T12:55:00Z
7
value 0.00332
scoring_system epss
scoring_elements 0.56124
published_at 2026-04-18T12:55:00Z
8
value 0.00332
scoring_system epss
scoring_elements 0.56122
published_at 2026-04-16T12:55:00Z
9
value 0.00332
scoring_system epss
scoring_elements 0.56087
published_at 2026-04-13T12:55:00Z
10
value 0.0043
scoring_system epss
scoring_elements 0.62537
published_at 2026-05-05T12:55:00Z
11
value 0.0043
scoring_system epss
scoring_elements 0.62562
published_at 2026-04-21T12:55:00Z
12
value 0.0043
scoring_system epss
scoring_elements 0.62573
published_at 2026-04-24T12:55:00Z
13
value 0.0043
scoring_system epss
scoring_elements 0.62589
published_at 2026-04-26T12:55:00Z
14
value 0.0043
scoring_system epss
scoring_elements 0.62586
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43342
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125108
reference_id 125108
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125108
5
reference_url https://support.apple.com/en-us/125109
reference_id 125109
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125109
6
reference_url https://support.apple.com/en-us/125110
reference_id 125110
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125110
7
reference_url https://support.apple.com/en-us/125113
reference_id 125113
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125113
8
reference_url https://support.apple.com/en-us/125114
reference_id 125114
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125114
9
reference_url https://support.apple.com/en-us/125115
reference_id 125115
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125115
10
reference_url https://support.apple.com/en-us/125116
reference_id 125116
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/
url https://support.apple.com/en-us/125116
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2397627
reference_id 2397627
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2397627
12
reference_url https://access.redhat.com/errata/RHSA-2025:17643
reference_id RHSA-2025:17643
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17643
13
reference_url https://access.redhat.com/errata/RHSA-2025:17741
reference_id RHSA-2025:17741
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17741
14
reference_url https://access.redhat.com/errata/RHSA-2025:17743
reference_id RHSA-2025:17743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17743
15
reference_url https://access.redhat.com/errata/RHSA-2025:17802
reference_id RHSA-2025:17802
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17802
16
reference_url https://access.redhat.com/errata/RHSA-2025:17807
reference_id RHSA-2025:17807
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:17807
17
reference_url https://access.redhat.com/errata/RHSA-2025:18097
reference_id RHSA-2025:18097
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:18097
18
reference_url https://access.redhat.com/errata/RHSA-2025:19109
reference_id RHSA-2025:19109
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19109
19
reference_url https://access.redhat.com/errata/RHSA-2025:19157
reference_id RHSA-2025:19157
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19157
20
reference_url https://access.redhat.com/errata/RHSA-2025:19165
reference_id RHSA-2025:19165
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19165
21
reference_url https://access.redhat.com/errata/RHSA-2025:19352
reference_id RHSA-2025:19352
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:19352
22
reference_url https://access.redhat.com/errata/RHSA-2025:20922
reference_id RHSA-2025:20922
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:20922
23
reference_url https://usn.ubuntu.com/7817-1/
reference_id USN-7817-1
reference_type
scores
url https://usn.ubuntu.com/7817-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43342
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-whma-xbxr-5uay
53
url VCID-wnxh-854z-ykfk
vulnerability_id VCID-wnxh-854z-ykfk
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43211
reference_id
reference_type
scores
0
value 0.00019
scoring_system epss
scoring_elements 0.05046
published_at 2026-04-02T12:55:00Z
1
value 0.00019
scoring_system epss
scoring_elements 0.04929
published_at 2026-04-07T12:55:00Z
2
value 0.00019
scoring_system epss
scoring_elements 0.04981
published_at 2026-04-09T12:55:00Z
3
value 0.00019
scoring_system epss
scoring_elements 0.04965
published_at 2026-04-08T12:55:00Z
4
value 0.00019
scoring_system epss
scoring_elements 0.0491
published_at 2026-04-04T12:55:00Z
5
value 0.00019
scoring_system epss
scoring_elements 0.04925
published_at 2026-04-13T12:55:00Z
6
value 0.00019
scoring_system epss
scoring_elements 0.04943
published_at 2026-04-12T12:55:00Z
7
value 0.00019
scoring_system epss
scoring_elements 0.04963
published_at 2026-04-11T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06309
published_at 2026-04-21T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06156
published_at 2026-04-18T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06144
published_at 2026-04-16T12:55:00Z
11
value 0.00026
scoring_system epss
scoring_elements 0.07114
published_at 2026-05-05T12:55:00Z
12
value 0.00026
scoring_system epss
scoring_elements 0.07134
published_at 2026-04-24T12:55:00Z
13
value 0.00026
scoring_system epss
scoring_elements 0.0714
published_at 2026-04-26T12:55:00Z
14
value 0.00026
scoring_system epss
scoring_elements 0.071
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43211
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386270
reference_id 2386270
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386270
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43211
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxh-854z-ykfk
54
url VCID-wrt4-z8ne-zffm
vulnerability_id VCID-wrt4-z8ne-zffm
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43457
reference_id
reference_type
scores
0
value 0.00031
scoring_system epss
scoring_elements 0.08968
published_at 2026-04-04T12:55:00Z
1
value 0.00031
scoring_system epss
scoring_elements 0.08899
published_at 2026-04-07T12:55:00Z
2
value 0.00031
scoring_system epss
scoring_elements 0.08977
published_at 2026-04-08T12:55:00Z
3
value 0.00031
scoring_system epss
scoring_elements 0.09009
published_at 2026-04-11T12:55:00Z
4
value 0.00031
scoring_system epss
scoring_elements 0.08972
published_at 2026-04-12T12:55:00Z
5
value 0.00031
scoring_system epss
scoring_elements 0.08959
published_at 2026-04-13T12:55:00Z
6
value 0.00032
scoring_system epss
scoring_elements 0.09336
published_at 2026-04-02T12:55:00Z
7
value 0.00048
scoring_system epss
scoring_elements 0.1479
published_at 2026-04-16T12:55:00Z
8
value 0.00048
scoring_system epss
scoring_elements 0.14797
published_at 2026-04-18T12:55:00Z
9
value 0.00084
scoring_system epss
scoring_elements 0.24303
published_at 2026-04-26T12:55:00Z
10
value 0.00084
scoring_system epss
scoring_elements 0.24147
published_at 2026-05-05T12:55:00Z
11
value 0.00084
scoring_system epss
scoring_elements 0.24261
published_at 2026-04-29T12:55:00Z
12
value 0.00084
scoring_system epss
scoring_elements 0.24431
published_at 2026-04-21T12:55:00Z
13
value 0.00086
scoring_system epss
scoring_elements 0.24738
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43457
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125638
7
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125639
8
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/
url https://support.apple.com/en-us/125640
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448786
reference_id 2448786
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448786
10
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
11
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
12
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
13
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
14
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43457
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wrt4-z8ne-zffm
55
url VCID-x5sh-5xtn-r7cp
vulnerability_id VCID-x5sh-5xtn-r7cp
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43214
reference_id
reference_type
scores
0
value 0.00147
scoring_system epss
scoring_elements 0.3515
published_at 2026-04-02T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.36948
published_at 2026-04-07T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.37013
published_at 2026-04-09T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.36999
published_at 2026-04-08T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.37121
published_at 2026-04-04T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.3696
published_at 2026-04-13T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.36986
published_at 2026-04-12T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.37021
published_at 2026-04-11T12:55:00Z
8
value 0.00218
scoring_system epss
scoring_elements 0.4447
published_at 2026-04-18T12:55:00Z
9
value 0.00218
scoring_system epss
scoring_elements 0.4448
published_at 2026-04-16T12:55:00Z
10
value 0.0038
scoring_system epss
scoring_elements 0.59506
published_at 2026-04-21T12:55:00Z
11
value 0.00423
scoring_system epss
scoring_elements 0.62116
published_at 2026-05-05T12:55:00Z
12
value 0.00423
scoring_system epss
scoring_elements 0.62178
published_at 2026-04-26T12:55:00Z
13
value 0.00423
scoring_system epss
scoring_elements 0.62172
published_at 2026-04-29T12:55:00Z
14
value 0.0046
scoring_system epss
scoring_elements 0.64175
published_at 2026-04-24T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43214
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124149
6
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124152
7
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124153
8
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124154
9
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/
url https://support.apple.com/en-us/124155
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448782
reference_id 2448782
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448782
11
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
12
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
13
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
14
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
15
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43214
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5sh-5xtn-r7cp
56
url VCID-xpp8-357g-c7gp
vulnerability_id VCID-xpp8-357g-c7gp
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43441
reference_id
reference_type
scores
0
value 0.00036
scoring_system epss
scoring_elements 0.10558
published_at 2026-04-07T12:55:00Z
1
value 0.00036
scoring_system epss
scoring_elements 0.10694
published_at 2026-04-04T12:55:00Z
2
value 0.00036
scoring_system epss
scoring_elements 0.10647
published_at 2026-04-13T12:55:00Z
3
value 0.00036
scoring_system epss
scoring_elements 0.10671
published_at 2026-04-12T12:55:00Z
4
value 0.00036
scoring_system epss
scoring_elements 0.10703
published_at 2026-04-11T12:55:00Z
5
value 0.00036
scoring_system epss
scoring_elements 0.10689
published_at 2026-04-09T12:55:00Z
6
value 0.00036
scoring_system epss
scoring_elements 0.1063
published_at 2026-04-08T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.1158
published_at 2026-04-02T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.14896
published_at 2026-05-05T12:55:00Z
9
value 0.00049
scoring_system epss
scoring_elements 0.14981
published_at 2026-04-16T12:55:00Z
10
value 0.00049
scoring_system epss
scoring_elements 0.14991
published_at 2026-04-18T12:55:00Z
11
value 0.00049
scoring_system epss
scoring_elements 0.15041
published_at 2026-04-21T12:55:00Z
12
value 0.00049
scoring_system epss
scoring_elements 0.1508
published_at 2026-04-24T12:55:00Z
13
value 0.00049
scoring_system epss
scoring_elements 0.15081
published_at 2026-04-26T12:55:00Z
14
value 0.00049
scoring_system epss
scoring_elements 0.15025
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43441
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125633
reference_id 125633
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125633
6
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125634
7
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125637
8
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125638
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448785
reference_id 2448785
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448785
11
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22789
12
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:22790
13
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23110
14
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23433
15
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23434
16
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23451
17
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23452
18
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23583
19
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23591
20
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23742
21
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23743
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43441
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xpp8-357g-c7gp
57
url VCID-xr5y-1ebg-xqcj
vulnerability_id VCID-xr5y-1ebg-xqcj
summary webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-13502
reference_id
reference_type
scores
0
value 0.00076
scoring_system epss
scoring_elements 0.22587
published_at 2026-04-24T12:55:00Z
1
value 0.00076
scoring_system epss
scoring_elements 0.22574
published_at 2026-04-29T12:55:00Z
2
value 0.00076
scoring_system epss
scoring_elements 0.22578
published_at 2026-04-26T12:55:00Z
3
value 0.00107
scoring_system epss
scoring_elements 0.28456
published_at 2026-05-05T12:55:00Z
4
value 0.0011
scoring_system epss
scoring_elements 0.29472
published_at 2026-04-09T12:55:00Z
5
value 0.0011
scoring_system epss
scoring_elements 0.29546
published_at 2026-04-04T12:55:00Z
6
value 0.0011
scoring_system epss
scoring_elements 0.29367
published_at 2026-04-07T12:55:00Z
7
value 0.0011
scoring_system epss
scoring_elements 0.29431
published_at 2026-04-12T12:55:00Z
8
value 0.0011
scoring_system epss
scoring_elements 0.29498
published_at 2026-04-02T12:55:00Z
9
value 0.0011
scoring_system epss
scoring_elements 0.29475
published_at 2026-04-11T12:55:00Z
10
value 0.0011
scoring_system epss
scoring_elements 0.29379
published_at 2026-04-13T12:55:00Z
11
value 0.0011
scoring_system epss
scoring_elements 0.29399
published_at 2026-04-16T12:55:00Z
12
value 0.0011
scoring_system epss
scoring_elements 0.29373
published_at 2026-04-18T12:55:00Z
13
value 0.00112
scoring_system epss
scoring_elements 0.29702
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-13502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416300
reference_id 2416300
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://bugzilla.redhat.com/show_bug.cgi?id=2416300
5
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
reference_id cpe:/a:redhat:enterprise_linux:8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream
6
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
reference_id cpe:/a:redhat:enterprise_linux:9::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream
7
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
reference_id cpe:/a:redhat:rhel_aus:8.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream
8
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
reference_id cpe:/a:redhat:rhel_aus:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream
9
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
reference_id cpe:/a:redhat:rhel_aus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream
10
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream
11
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_id cpe:/a:redhat:rhel_e4s:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream
12
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.0::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream
13
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_id cpe:/a:redhat:rhel_e4s:9.2::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream
14
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
reference_id cpe:/a:redhat:rhel_eus:9.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream
15
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
reference_id cpe:/a:redhat:rhel_eus:9.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream
16
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_id cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream
17
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
reference_id cpe:/a:redhat:rhel_tus:8.6::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream
18
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
reference_id cpe:/a:redhat:rhel_tus:8.8::appstream
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream
19
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
reference_id cpe:/o:redhat:enterprise_linux:6
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6
20
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
reference_id cpe:/o:redhat:enterprise_linux:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7
21
reference_url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
reference_id cpe:/o:redhat:rhel_els:7
reference_type
scores
url https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7
22
reference_url https://access.redhat.com/security/cve/CVE-2025-13502
reference_id CVE-2025-13502
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/security/cve/CVE-2025-13502
23
reference_url https://access.redhat.com/errata/RHSA-2025:22789
reference_id RHSA-2025:22789
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:22789
24
reference_url https://access.redhat.com/errata/RHSA-2025:22790
reference_id RHSA-2025:22790
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:22790
25
reference_url https://access.redhat.com/errata/RHSA-2025:23110
reference_id RHSA-2025:23110
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23110
26
reference_url https://access.redhat.com/errata/RHSA-2025:23433
reference_id RHSA-2025:23433
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23433
27
reference_url https://access.redhat.com/errata/RHSA-2025:23434
reference_id RHSA-2025:23434
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23434
28
reference_url https://access.redhat.com/errata/RHSA-2025:23451
reference_id RHSA-2025:23451
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23451
29
reference_url https://access.redhat.com/errata/RHSA-2025:23452
reference_id RHSA-2025:23452
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23452
30
reference_url https://access.redhat.com/errata/RHSA-2025:23583
reference_id RHSA-2025:23583
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23583
31
reference_url https://access.redhat.com/errata/RHSA-2025:23591
reference_id RHSA-2025:23591
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23591
32
reference_url https://access.redhat.com/errata/RHSA-2025:23742
reference_id RHSA-2025:23742
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23742
33
reference_url https://access.redhat.com/errata/RHSA-2025:23743
reference_id RHSA-2025:23743
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://access.redhat.com/errata/RHSA-2025:23743
34
reference_url https://bugs.webkit.org/show_bug.cgi?id=302218
reference_id show_bug.cgi?id=302218
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/
url https://bugs.webkit.org/show_bug.cgi?id=302218
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-13502
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xr5y-1ebg-xqcj
58
url VCID-yfww-r9rn-73dy
vulnerability_id VCID-yfww-r9rn-73dy
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-20608
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02479
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02467
published_at 2026-04-18T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02461
published_at 2026-04-16T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.02478
published_at 2026-04-13T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.0248
published_at 2026-04-12T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02515
published_at 2026-04-09T12:55:00Z
6
value 0.00014
scoring_system epss
scoring_elements 0.02491
published_at 2026-04-11T12:55:00Z
7
value 0.00014
scoring_system epss
scoring_elements 0.02495
published_at 2026-04-08T12:55:00Z
8
value 0.00023
scoring_system epss
scoring_elements 0.06389
published_at 2026-05-05T12:55:00Z
9
value 0.00023
scoring_system epss
scoring_elements 0.06316
published_at 2026-04-21T12:55:00Z
10
value 0.00023
scoring_system epss
scoring_elements 0.06333
published_at 2026-04-24T12:55:00Z
11
value 0.00023
scoring_system epss
scoring_elements 0.0636
published_at 2026-04-26T12:55:00Z
12
value 0.00023
scoring_system epss
scoring_elements 0.06372
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-20608
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126346
reference_id 126346
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126346
5
reference_url https://support.apple.com/en-us/126347
reference_id 126347
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126347
6
reference_url https://support.apple.com/en-us/126348
reference_id 126348
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126348
7
reference_url https://support.apple.com/en-us/126353
reference_id 126353
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126353
8
reference_url https://support.apple.com/en-us/126354
reference_id 126354
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/
url https://support.apple.com/en-us/126354
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448789
reference_id 2448789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448789
10
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
11
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
12
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
13
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
14
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-20608
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yfww-r9rn-73dy
59
url VCID-yg6b-hsst-ckaa
vulnerability_id VCID-yg6b-hsst-ckaa
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31278
reference_id
reference_type
scores
0
value 0.00096
scoring_system epss
scoring_elements 0.2663
published_at 2026-04-02T12:55:00Z
1
value 0.00105
scoring_system epss
scoring_elements 0.28505
published_at 2026-04-07T12:55:00Z
2
value 0.00105
scoring_system epss
scoring_elements 0.2861
published_at 2026-04-09T12:55:00Z
3
value 0.00105
scoring_system epss
scoring_elements 0.28569
published_at 2026-04-08T12:55:00Z
4
value 0.00105
scoring_system epss
scoring_elements 0.28699
published_at 2026-04-04T12:55:00Z
5
value 0.00105
scoring_system epss
scoring_elements 0.28519
published_at 2026-04-13T12:55:00Z
6
value 0.00105
scoring_system epss
scoring_elements 0.28568
published_at 2026-04-12T12:55:00Z
7
value 0.00105
scoring_system epss
scoring_elements 0.28612
published_at 2026-04-11T12:55:00Z
8
value 0.00142
scoring_system epss
scoring_elements 0.3441
published_at 2026-04-21T12:55:00Z
9
value 0.00142
scoring_system epss
scoring_elements 0.34449
published_at 2026-04-18T12:55:00Z
10
value 0.00142
scoring_system epss
scoring_elements 0.34464
published_at 2026-04-16T12:55:00Z
11
value 0.00158
scoring_system epss
scoring_elements 0.36139
published_at 2026-05-05T12:55:00Z
12
value 0.00158
scoring_system epss
scoring_elements 0.36372
published_at 2026-04-24T12:55:00Z
13
value 0.00158
scoring_system epss
scoring_elements 0.36342
published_at 2026-04-26T12:55:00Z
14
value 0.00158
scoring_system epss
scoring_elements 0.36256
published_at 2026-04-29T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31278
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/124147
reference_id 124147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124147
5
reference_url https://support.apple.com/en-us/124148
reference_id 124148
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124148
6
reference_url https://support.apple.com/en-us/124149
reference_id 124149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124149
7
reference_url https://support.apple.com/en-us/124152
reference_id 124152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124152
8
reference_url https://support.apple.com/en-us/124153
reference_id 124153
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124153
9
reference_url https://support.apple.com/en-us/124154
reference_id 124154
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124154
10
reference_url https://support.apple.com/en-us/124155
reference_id 124155
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/
url https://support.apple.com/en-us/124155
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2386269
reference_id 2386269
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2386269
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:13780
reference_id RHSA-2025:13780
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13780
14
reference_url https://access.redhat.com/errata/RHSA-2025:13782
reference_id RHSA-2025:13782
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:13782
15
reference_url https://access.redhat.com/errata/RHSA-2025:14421
reference_id RHSA-2025:14421
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14421
16
reference_url https://access.redhat.com/errata/RHSA-2025:14422
reference_id RHSA-2025:14422
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14422
17
reference_url https://access.redhat.com/errata/RHSA-2025:14423
reference_id RHSA-2025:14423
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14423
18
reference_url https://access.redhat.com/errata/RHSA-2025:14432
reference_id RHSA-2025:14432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14432
19
reference_url https://access.redhat.com/errata/RHSA-2025:14433
reference_id RHSA-2025:14433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14433
20
reference_url https://access.redhat.com/errata/RHSA-2025:14434
reference_id RHSA-2025:14434
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14434
21
reference_url https://access.redhat.com/errata/RHSA-2025:14486
reference_id RHSA-2025:14486
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:14486
22
reference_url https://access.redhat.com/errata/RHSA-2025:15729
reference_id RHSA-2025:15729
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:15729
23
reference_url https://usn.ubuntu.com/7702-1/
reference_id USN-7702-1
reference_type
scores
url https://usn.ubuntu.com/7702-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-31278
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6b-hsst-ckaa
60
url VCID-z7hw-fywx-dffc
vulnerability_id VCID-z7hw-fywx-dffc
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43535
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11546
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11601
published_at 2026-04-04T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.1139
published_at 2026-04-07T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11473
published_at 2026-04-08T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11532
published_at 2026-04-09T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11542
published_at 2026-04-11T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11508
published_at 2026-04-12T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11478
published_at 2026-04-13T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.11339
published_at 2026-04-16T12:55:00Z
9
value 0.00047
scoring_system epss
scoring_elements 0.14429
published_at 2026-04-21T12:55:00Z
10
value 0.00047
scoring_system epss
scoring_elements 0.14379
published_at 2026-04-29T12:55:00Z
11
value 0.00047
scoring_system epss
scoring_elements 0.14434
published_at 2026-04-26T12:55:00Z
12
value 0.00047
scoring_system epss
scoring_elements 0.14461
published_at 2026-04-24T12:55:00Z
13
value 0.00047
scoring_system epss
scoring_elements 0.14238
published_at 2026-05-05T12:55:00Z
14
value 0.00047
scoring_system epss
scoring_elements 0.14359
published_at 2026-04-18T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43535
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125884
reference_id 125884
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125884
5
reference_url https://support.apple.com/en-us/125885
reference_id 125885
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125885
6
reference_url https://support.apple.com/en-us/125886
reference_id 125886
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125886
7
reference_url https://support.apple.com/en-us/125891
reference_id 125891
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125891
8
reference_url https://support.apple.com/en-us/125892
reference_id 125892
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/
url https://support.apple.com/en-us/125892
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2423188
reference_id 2423188
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2423188
10
reference_url https://access.redhat.com/errata/RHSA-2025:23663
reference_id RHSA-2025:23663
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23663
11
reference_url https://access.redhat.com/errata/RHSA-2025:23700
reference_id RHSA-2025:23700
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23700
12
reference_url https://access.redhat.com/errata/RHSA-2025:23967
reference_id RHSA-2025:23967
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23967
13
reference_url https://access.redhat.com/errata/RHSA-2025:23968
reference_id RHSA-2025:23968
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23968
14
reference_url https://access.redhat.com/errata/RHSA-2025:23969
reference_id RHSA-2025:23969
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23969
15
reference_url https://access.redhat.com/errata/RHSA-2025:23970
reference_id RHSA-2025:23970
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23970
16
reference_url https://access.redhat.com/errata/RHSA-2025:23971
reference_id RHSA-2025:23971
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23971
17
reference_url https://access.redhat.com/errata/RHSA-2025:23972
reference_id RHSA-2025:23972
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23972
18
reference_url https://access.redhat.com/errata/RHSA-2025:23973
reference_id RHSA-2025:23973
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23973
19
reference_url https://access.redhat.com/errata/RHSA-2025:23974
reference_id RHSA-2025:23974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23974
20
reference_url https://access.redhat.com/errata/RHSA-2025:23975
reference_id RHSA-2025:23975
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:23975
21
reference_url https://usn.ubuntu.com/7957-1/
reference_id USN-7957-1
reference_type
scores
url https://usn.ubuntu.com/7957-1/
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2025-43535
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-z7hw-fywx-dffc
61
url VCID-zk2j-9hd2-hfcn
vulnerability_id VCID-zk2j-9hd2-hfcn
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-28857
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.11507
published_at 2026-04-02T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11349
published_at 2026-04-07T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11561
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11433
published_at 2026-04-08T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.1149
published_at 2026-04-09T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11496
published_at 2026-04-11T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11463
published_at 2026-04-12T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11434
published_at 2026-04-13T12:55:00Z
8
value 0.00038
scoring_system epss
scoring_elements 0.113
published_at 2026-04-16T12:55:00Z
9
value 0.00038
scoring_system epss
scoring_elements 0.11299
published_at 2026-04-18T12:55:00Z
10
value 0.00038
scoring_system epss
scoring_elements 0.11422
published_at 2026-04-21T12:55:00Z
11
value 0.00038
scoring_system epss
scoring_elements 0.11366
published_at 2026-04-24T12:55:00Z
12
value 0.00041
scoring_system epss
scoring_elements 0.12359
published_at 2026-05-05T12:55:00Z
13
value 0.00041
scoring_system epss
scoring_elements 0.12447
published_at 2026-04-29T12:55:00Z
14
value 0.00041
scoring_system epss
scoring_elements 0.12564
published_at 2026-04-26T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-28857
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/126792
reference_id 126792
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/
url https://support.apple.com/en-us/126792
5
reference_url https://support.apple.com/en-us/126794
reference_id 126794
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/
url https://support.apple.com/en-us/126794
6
reference_url https://support.apple.com/en-us/126799
reference_id 126799
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/
url https://support.apple.com/en-us/126799
7
reference_url https://support.apple.com/en-us/126800
reference_id 126800
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/
url https://support.apple.com/en-us/126800
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2453004
reference_id 2453004
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2453004
9
reference_url https://access.redhat.com/errata/RHSA-2026:10702
reference_id RHSA-2026:10702
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:10702
10
reference_url https://access.redhat.com/errata/RHSA-2026:11329
reference_id RHSA-2026:11329
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11329
11
reference_url https://access.redhat.com/errata/RHSA-2026:11814
reference_id RHSA-2026:11814
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:11814
12
reference_url https://access.redhat.com/errata/RHSA-2026:13845
reference_id RHSA-2026:13845
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:13845
13
reference_url https://access.redhat.com/errata/RHSA-2026:9692
reference_id RHSA-2026:9692
reference_type
scores
url https://access.redhat.com/errata/RHSA-2026:9692
fixed_packages
0
url pkg:deb/debian/wpewebkit@2.52.1-1
purl pkg:deb/debian/wpewebkit@2.52.1-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1
1
url pkg:deb/debian/wpewebkit@2.52.3-1
purl pkg:deb/debian/wpewebkit@2.52.3-1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1
aliases CVE-2026-28857
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zk2j-9hd2-hfcn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1