{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","type":"deb","namespace":"debian","name":"wpewebkit","version":"2.52.3-1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61856?format=json","vulnerability_id":"VCID-1vsk-e1mf-6uaz","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43216.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43216","reference_id":"","reference_type":"","scores":[{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28385","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29849","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29948","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29912","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.30035","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29857","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29906","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00113","scoring_system":"epss","scoring_elements":"0.29953","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36009","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36062","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00153","scoring_system":"epss","scoring_elements":"0.36076","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37865","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.381","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38077","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37983","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43216"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43216"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:23:42Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386273","reference_id":"2386273","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386273"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43216"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1vsk-e1mf-6uaz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64216?format=json","vulnerability_id":"VCID-25ng-4kwb-qfat","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20636.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20636","reference_id":"","reference_type":"","scores":[{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12694","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12549","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12738","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12628","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.1268","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12648","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12606","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12561","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12475","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18309","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18499","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18485","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18442","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18606","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20636"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20636"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T20:05:15Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448791","reference_id":"2448791","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448791"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20636"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-25ng-4kwb-qfat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66399?format=json","vulnerability_id":"VCID-2hr6-uu49-1qb7","summary":"webkit: WebKitGTK: Remote user-assisted information disclosure via file drag-and-drop","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13947.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13947","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10276","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17412","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22386","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22382","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22307","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22388","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22443","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22464","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22423","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22368","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2247","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22459","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22624","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.2246","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13947"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418576","reference_id":"2418576","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418576"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-13947","reference_id":"CVE-2025-13947","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-13947"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://bugs.webkit.org/show_bug.cgi?id=271957","reference_id":"show_bug.cgi?id=271957","reference_type":"","scores":[{"value":"7.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-03T14:12:21Z/"}],"url":"https://bugs.webkit.org/show_bug.cgi?id=271957"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-13947"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.7","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2hr6-uu49-1qb7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66451?format=json","vulnerability_id":"VCID-2pgr-9muu-s3ge","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43443.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43443","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14973","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15169","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14982","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15043","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15081","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15114","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15061","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16305","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20206","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20468","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20467","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2034","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20335","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20302","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2087","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43443"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:33:25Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416337","reference_id":"2416337","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416337"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43443"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-2pgr-9muu-s3ge"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61852?format=json","vulnerability_id":"VCID-3k6e-zz11-93bn","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31273.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31273","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26463","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28318","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28427","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28384","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28524","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.2833","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28387","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00104","scoring_system":"epss","scoring_elements":"0.28431","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34218","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34253","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.34265","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.35947","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3618","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3615","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36063","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31273"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31273"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:00Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386268","reference_id":"2386268","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386268"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-31273"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3k6e-zz11-93bn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64217?format=json","vulnerability_id":"VCID-4k57-k2s6-wkhx","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20644.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20644","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1368","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13542","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13623","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13674","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13644","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13607","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13559","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13474","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.1347","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22256","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22238","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22135","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22409","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00074","scoring_system":"epss","scoring_elements":"0.22243","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20644"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20644"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:26:46Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448792","reference_id":"2448792","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448792"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20644"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-4k57-k2s6-wkhx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61855?format=json","vulnerability_id":"VCID-5q44-vqhn-zydx","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43212.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43212","reference_id":"","reference_type":"","scores":[{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24845","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26106","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26221","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26173","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26334","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26124","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26184","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26229","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.3198","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32006","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00127","scoring_system":"epss","scoring_elements":"0.32029","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33723","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33949","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33928","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00141","scoring_system":"epss","scoring_elements":"0.33844","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43212"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43212"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:12Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386271","reference_id":"2386271","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386271"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43212"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-5q44-vqhn-zydx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65877?format=json","vulnerability_id":"VCID-76jg-y2sa-f7cu","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43501.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43501","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22861","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22652","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22728","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22779","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22801","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22763","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22706","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22722","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28795","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28916","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28684","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28615","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.2846","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28961","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43501"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-12-19T04:55:32Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423185","reference_id":"2423185","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423185"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43501"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-76jg-y2sa-f7cu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66445?format=json","vulnerability_id":"VCID-7j7p-hnbd-hudk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43429.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43429","reference_id":"","reference_type":"","scores":[{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13587","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13785","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13604","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13653","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13689","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14338","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18631","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18902","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18817","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18796","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.18751","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19305","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43429"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:43:32Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416330","reference_id":"2416330","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416330"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43429"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7j7p-hnbd-hudk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64206?format=json","vulnerability_id":"VCID-7ut5-fu6w-63fs","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43213.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43213","reference_id":"","reference_type":"","scores":[{"value":"0.0012","scoring_system":"epss","scoring_elements":"0.3113","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31172","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31256","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31225","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31353","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31173","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.31216","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00121","scoring_system":"epss","scoring_elements":"0.3126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37363","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37419","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00164","scoring_system":"epss","scoring_elements":"0.37437","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39577","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39794","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00183","scoring_system":"epss","scoring_elements":"0.39709","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00199","scoring_system":"epss","scoring_elements":"0.41898","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43213"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:30:07Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448781","reference_id":"2448781","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448781"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43213"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ut5-fu6w-63fs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63947?format=json","vulnerability_id":"VCID-88kv-qter-5fc3","summary":"webkitgtk: A malicious website may be able to access script message handlers intended for other origins","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"4.7","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28861.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28861","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10511","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10489","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11502","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1143","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28861"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28861"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T13:48:37Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453007","reference_id":"2453007","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453007"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-28861"],"risk_score":2.1,"exploitability":"0.5","weighted_severity":"4.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-88kv-qter-5fc3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63942?format=json","vulnerability_id":"VCID-8cxd-4p9j-dyf1","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20664.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20664","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11348","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11561","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11432","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11489","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11495","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11462","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11433","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11422","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12563","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12445","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12357","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20664"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20664"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:20:44Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453001","reference_id":"2453001","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453001"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20664"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8cxd-4p9j-dyf1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64212?format=json","vulnerability_id":"VCID-988h-sqnj-57fg","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43511.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43511","reference_id":"","reference_type":"","scores":[{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.1933","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19125","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19045","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00061","scoring_system":"epss","scoring_elements":"0.19184","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24924","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24932","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00087","scoring_system":"epss","scoring_elements":"0.24919","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31348","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31875","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31708","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31581","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00126","scoring_system":"epss","scoring_elements":"0.31497","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43511"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43511"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-13T22:35:12Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448787","reference_id":"2448787","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448787"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43511"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-988h-sqnj-57fg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66446?format=json","vulnerability_id":"VCID-ahcu-937r-57fu","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43430.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43430","reference_id":"","reference_type":"","scores":[{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.2633","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26388","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26434","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26426","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26376","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26528","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26308","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26426","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26759","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26731","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26638","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26631","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00097","scoring_system":"epss","scoring_elements":"0.26559","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00099","scoring_system":"epss","scoring_elements":"0.27201","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27546","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43430"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T12:56:41Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416331","reference_id":"2416331","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416331"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43430"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ahcu-937r-57fu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67451?format=json","vulnerability_id":"VCID-aqvh-emss-bufx","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43368.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43368","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14617","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14706","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15105","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17153","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17106","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.17045","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21392","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21543","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21396","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21378","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21283","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43368"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:20:05Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397630","reference_id":"2397630","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397630"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43368"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-aqvh-emss-bufx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66442?format=json","vulnerability_id":"VCID-az2z-2mnu-sfbh","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43419.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43419","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10411","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10484","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10552","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10581","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10548","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10526","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17182","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17189","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17129","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17109","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.17052","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00055","scoring_system":"epss","scoring_elements":"0.16916","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17625","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43419"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:38:10Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416326","reference_id":"2416326","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416326"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43419"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-az2z-2mnu-sfbh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64209?format=json","vulnerability_id":"VCID-bjtx-twmy-jbgk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43438.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43438","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15081","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15025","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43438"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43438"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-15T04:56:21Z/"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:13:41Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448784","reference_id":"2448784","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448784"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43438"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bjtx-twmy-jbgk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65878?format=json","vulnerability_id":"VCID-dvx9-km9t-yqfv","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43531.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43531","reference_id":"","reference_type":"","scores":[{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30817","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30711","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30687","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30733","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30777","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30774","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30742","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30865","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00118","scoring_system":"epss","scoring_elements":"0.30683","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37463","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37968","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37908","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37694","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37672","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37579","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43531"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125889","reference_id":"125889","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125889"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:10:04Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423187","reference_id":"2423187","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43531"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dvx9-km9t-yqfv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67448?format=json","vulnerability_id":"VCID-ednn-ppw1-myfk","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43272.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43272","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14693","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19534","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19812","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19614","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19667","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21983","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21978","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22086","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22045","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21985","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25834","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25943","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25992","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.25996","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00094","scoring_system":"epss","scoring_elements":"0.26056","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43272"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:16Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397626","reference_id":"2397626","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397626"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43272"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ednn-ppw1-myfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66367?format=json","vulnerability_id":"VCID-ems1-41u6-vbex","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43458.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43458","reference_id":"","reference_type":"","scores":[{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21892","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22117","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21944","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22003","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22044","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.22029","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00072","scoring_system":"epss","scoring_elements":"0.21974","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00075","scoring_system":"epss","scoring_elements":"0.22678","published_at":"2026-04-02T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27243","published_at":"2026-05-05T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27709","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27593","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27485","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27413","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00103","scoring_system":"epss","scoring_elements":"0.28104","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43458"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T19:08:59Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418855","reference_id":"2418855","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418855"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43458"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ems1-41u6-vbex"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66453?format=json","vulnerability_id":"VCID-epzj-t14z-43d2","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43421.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43421","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08272","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08327","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08336","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08353","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08344","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08324","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08307","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08623","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11349","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1128","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11306","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11241","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11175","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11279","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11718","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43421"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:09:19Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416355","reference_id":"2416355","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416355"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43421"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-epzj-t14z-43d2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63948?format=json","vulnerability_id":"VCID-eu4s-vvyf-pqh3","summary":"webkitgtk: Visiting a maliciously crafted website may lead to a cross-site scripting attack","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28871.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28871","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10075","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10032","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10108","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10169","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10209","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10149","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10022","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09999","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10129","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.10105","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11098","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.11035","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.1097","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28871"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28871"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-27T19:47:46Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453008","reference_id":"2453008","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453008"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-28871"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eu4s-vvyf-pqh3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63946?format=json","vulnerability_id":"VCID-ffha-wafn-sqa9","summary":"webkitgtk: A malicious website may be able to process restricted web content outside the sandbox","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28859.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28859","reference_id":"","reference_type":"","scores":[{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.12006","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11889","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11919","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.118","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11803","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11933","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11959","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11996","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11988","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11936","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1205","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11853","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12882","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1308","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12977","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28859"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28859"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126797","reference_id":"126797","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126797"},{"reference_url":"https://support.apple.com/en-us/126798","reference_id":"126798","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126798"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:29:45Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453006","reference_id":"2453006","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453006"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-28859"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ffha-wafn-sqa9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63944?format=json","vulnerability_id":"VCID-fpvs-seby-kfhv","summary":"webkitgtk: A maliciously crafted webpage may be able to fingerprint the user","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20691.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20691","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10448","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10517","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10377","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1045","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10514","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10544","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10511","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10489","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10356","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.1033","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10458","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10444","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.11502","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00039","scoring_system":"epss","scoring_elements":"0.1143","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20691"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20691"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126798","reference_id":"126798","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126798"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-25T15:08:58Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453003","reference_id":"2453003","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453003"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20691"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fpvs-seby-kfhv"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66443?format=json","vulnerability_id":"VCID-gqjq-p4re-gkf6","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43425.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43425","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14525","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14944","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43425"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:53:15Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416327","reference_id":"2416327","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416327"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43425"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqjq-p4re-gkf6"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63943?format=json","vulnerability_id":"VCID-gqm2-5nh3-7ufp","summary":"webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20665.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20665","reference_id":"","reference_type":"","scores":[{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3659","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3622","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36448","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36504","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36521","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36479","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36502","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36537","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.3653","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36511","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36623","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00157","scoring_system":"epss","scoring_elements":"0.36459","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37908","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38116","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38022","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20665"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20665"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126797","reference_id":"126797","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126797"},{"reference_url":"https://support.apple.com/en-us/126798","reference_id":"126798","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126798"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-03-25T19:30:29Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453002","reference_id":"2453002","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453002"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20665"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gqm2-5nh3-7ufp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64205?format=json","vulnerability_id":"VCID-gwt6-n8ue-mqcf","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31277.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31277","reference_id":"","reference_type":"","scores":[{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.37888","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38121","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38097","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00171","scoring_system":"epss","scoring_elements":"0.38004","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39139","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39174","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39173","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39147","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39163","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39175","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3912","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39143","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40311","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00192","scoring_system":"epss","scoring_elements":"0.4111","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31277"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31277"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-21T04:00:59Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448780","reference_id":"2448780","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-31277"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gwt6-n8ue-mqcf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61860?format=json","vulnerability_id":"VCID-hvj6-wsg9-1bhg","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43265.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43265","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04829","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05422","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05457","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05414","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0543","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.05436","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0002","scoring_system":"epss","scoring_elements":"0.0545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07746","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07596","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00027","scoring_system":"epss","scoring_elements":"0.07608","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08591","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.087","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08653","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08656","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43265"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43265"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T14:31:16Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386276","reference_id":"2386276","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386276"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43265"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hvj6-wsg9-1bhg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65881?format=json","vulnerability_id":"VCID-j31g-7h17-27c8","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43541.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43541","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13378","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13443","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13239","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13321","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13373","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13342","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13255","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.1316","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16676","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20092","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20131","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20252","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20125","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20004","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43541"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:09Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423191","reference_id":"2423191","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423191"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43541"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-j31g-7h17-27c8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64204?format=json","vulnerability_id":"VCID-jbuw-yp7v-4fcz","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31223.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31223","reference_id":"","reference_type":"","scores":[{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66903","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66859","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66831","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66881","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66894","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66914","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.669","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66868","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66901","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66915","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66897","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66922","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66935","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00522","scoring_system":"epss","scoring_elements":"0.66933","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00534","scoring_system":"epss","scoring_elements":"0.67378","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31223"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-14T04:01:03Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448779","reference_id":"2448779","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448779"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-31223"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jbuw-yp7v-4fcz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66054?format=json","vulnerability_id":"VCID-jyw2-fu8s-3fha","summary":"Google Chrome: chromium: webkitgtk: Out of bounds memory access via crafted HTML page","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-14174.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14174","reference_id":"","reference_type":"","scores":[{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75156","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.7521","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75187","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75163","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00871","scoring_system":"epss","scoring_elements":"0.75198","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75819","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0091","scoring_system":"epss","scoring_elements":"0.75838","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77094","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77073","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.77038","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01002","scoring_system":"epss","scoring_elements":"0.7708","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01047","scoring_system":"epss","scoring_elements":"0.77593","published_at":"2026-05-05T12:55:00Z"},{"value":"0.01047","scoring_system":"epss","scoring_elements":"0.77501","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01047","scoring_system":"epss","scoring_elements":"0.77539","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01047","scoring_system":"epss","scoring_elements":"0.77536","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-14174"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2421824","reference_id":"2421824","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2421824"},{"reference_url":"https://issues.chromium.org/issues/466192044","reference_id":"466192044","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/"}],"url":"https://issues.chromium.org/issues/466192044"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html","reference_id":"stable-channel-update-for-desktop_10.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-12T20:28:29Z/"}],"url":"https://chromereleases.googleblog.com/2025/12/stable-channel-update-for-desktop_10.html"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-14174"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-jyw2-fu8s-3fha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67450?format=json","vulnerability_id":"VCID-kx6w-wbua-5ffr","summary":"webkitgtk: A website may be able to access sensor information without user consent","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43356.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43356","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15335","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15278","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15227","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00053","scoring_system":"epss","scoring_elements":"0.16805","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16491","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16765","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.1667","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16658","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00054","scoring_system":"epss","scoring_elements":"0.16624","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17708","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17565","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17557","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17611","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00056","scoring_system":"epss","scoring_elements":"0.17662","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43356"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125109","reference_id":"125109","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125109"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-09-16T13:39:43Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397628","reference_id":"2397628","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397628"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43356"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kx6w-wbua-5ffr"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66910?format=json","vulnerability_id":"VCID-m59e-8bgm-77he","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43343.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43343","reference_id":"","reference_type":"","scores":[{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35082","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35109","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.34988","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35033","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00146","scoring_system":"epss","scoring_elements":"0.35061","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3798","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37963","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37917","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37942","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44222","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44225","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44143","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44022","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00217","scoring_system":"epss","scoring_elements":"0.44308","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43343"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125110","reference_id":"125110","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125110"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:36:38Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403598","reference_id":"2403598","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2403598"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18070","reference_id":"RHSA-2025:18070","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18070"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19913","reference_id":"RHSA-2025:19913","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19913"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19914","reference_id":"RHSA-2025:19914","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19914"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19915","reference_id":"RHSA-2025:19915","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19915"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19916","reference_id":"RHSA-2025:19916","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19916"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19918","reference_id":"RHSA-2025:19918","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19918"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19919","reference_id":"RHSA-2025:19919","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19919"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19920","reference_id":"RHSA-2025:19920","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19920"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19946","reference_id":"RHSA-2025:19946","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19946"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7895-1/","reference_id":"USN-7895-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7895-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43343"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m59e-8bgm-77he"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66449?format=json","vulnerability_id":"VCID-mfg4-2ma4-3qgj","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43434.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43434","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15081","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15025","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15473","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:14:28Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416335","reference_id":"2416335","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416335"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43434"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mfg4-2ma4-3qgj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66447?format=json","vulnerability_id":"VCID-mhfm-j5xm-wybd","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43431.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43431","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12988","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00044","scoring_system":"epss","scoring_elements":"0.13656","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20153","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20284","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20279","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20244","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20796","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43431"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:21Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416332","reference_id":"2416332","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416332"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43431"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mhfm-j5xm-wybd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64215?format=json","vulnerability_id":"VCID-mmcp-4qnx-5ufh","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20635.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20635","reference_id":"","reference_type":"","scores":[{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15212","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15207","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15291","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15357","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15396","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15435","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15385","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15493","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15297","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.2393","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24221","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24098","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24085","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00083","scoring_system":"epss","scoring_elements":"0.24043","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20635"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20635"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126351","reference_id":"126351","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126351"},{"reference_url":"https://support.apple.com/en-us/126352","reference_id":"126352","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126352"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-12T15:58:56Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448790","reference_id":"2448790","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20635"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mmcp-4qnx-5ufh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65880?format=json","vulnerability_id":"VCID-nmvc-maj7-rfhm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43536.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43536","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18813","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18588","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18866","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18667","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18723","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18728","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18681","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.1863","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18574","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24416","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.2429","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24471","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24551","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00085","scoring_system":"epss","scoring_elements":"0.24527","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43536"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:09:31Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423190","reference_id":"2423190","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423190"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43536"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nmvc-maj7-rfhm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61859?format=json","vulnerability_id":"VCID-nu9v-3xak-77aw","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43240.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43240","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08273","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09161","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0913","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.0905","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09128","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09114","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17722","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17674","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00057","scoring_system":"epss","scoring_elements":"0.17683","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.2539","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25562","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25554","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00091","scoring_system":"epss","scoring_elements":"0.25504","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43240"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43240"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:28:26Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384385","reference_id":"2384385","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2384385"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43240"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nu9v-3xak-77aw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63941?format=json","vulnerability_id":"VCID-nwkr-s7vs-p7fz","summary":"webkitgtk: Processing maliciously crafted web content may bypass Same Origin Policy","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20643.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20643","reference_id":"","reference_type":"","scores":[{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09744","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09655","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09771","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09788","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0982","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0981","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.0976","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09793","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00034","scoring_system":"epss","scoring_elements":"0.09689","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10705","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10783","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10904","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10864","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10823","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00037","scoring_system":"epss","scoring_elements":"0.10762","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20643"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20643"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126604","reference_id":"126604","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126604"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126793","reference_id":"126793","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126793"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"5.4","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-18T13:14:53Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453000","reference_id":"2453000","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453000"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20643"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"4.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-nwkr-s7vs-p7fz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61858?format=json","vulnerability_id":"VCID-p84d-5ze6-9fb5","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43228.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43228","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1092","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12105","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.1217","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.11971","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12053","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12112","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12075","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12046","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18433","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00059","scoring_system":"epss","scoring_elements":"0.18412","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20062","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20187","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20182","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20148","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43228"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43228"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T13:24:35Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386275","reference_id":"2386275","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386275"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43228"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-p84d-5ze6-9fb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66045?format=json","vulnerability_id":"VCID-ph63-r178-pfgg","summary":"webkitgtk: webkitgtk: Use-after-free due to improper memory management","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43529.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43529","reference_id":"","reference_type":"","scores":[{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31787","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31831","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31731","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.31702","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00125","scoring_system":"epss","scoring_elements":"0.3165","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34624","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35911","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35872","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35896","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00152","scoring_system":"epss","scoring_elements":"0.35936","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37475","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00167","scoring_system":"epss","scoring_elements":"0.37564","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00175","scoring_system":"epss","scoring_elements":"0.39005","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00215","scoring_system":"epss","scoring_elements":"0.43775","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43529"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125889","reference_id":"125889","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125889"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-12-17T21:04:30Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423166","reference_id":"2423166","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423166"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43529"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ph63-r178-pfgg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66450?format=json","vulnerability_id":"VCID-pwqw-z8jj-abfs","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43440.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43440","reference_id":"","reference_type":"","scores":[{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12027","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12226","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12099","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12131","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12168","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12161","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0004","scoring_system":"epss","scoring_elements":"0.12109","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00042","scoring_system":"epss","scoring_elements":"0.13044","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.18908","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19171","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.1918","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19081","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19072","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00062","scoring_system":"epss","scoring_elements":"0.19027","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19628","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43440"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T15:22:19Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416336","reference_id":"2416336","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416336"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43440"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pwqw-z8jj-abfs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66448?format=json","vulnerability_id":"VCID-qytm-81jk-muhc","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43432.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43432","reference_id":"","reference_type":"","scores":[{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10179","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10283","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10285","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10304","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10345","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10315","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00035","scoring_system":"epss","scoring_elements":"0.10253","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10752","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.1444","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14525","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14531","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14626","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14622","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14562","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14944","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43432"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T14:41:58Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416334","reference_id":"2416334","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416334"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43432"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qytm-81jk-muhc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61857?format=json","vulnerability_id":"VCID-r857-ke39-xug8","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43227.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43227","reference_id":"","reference_type":"","scores":[{"value":"0.00132","scoring_system":"epss","scoring_elements":"0.32854","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34632","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34704","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34676","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34755","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34644","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34668","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00143","scoring_system":"epss","scoring_elements":"0.34707","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43889","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43957","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00214","scoring_system":"epss","scoring_elements":"0.43966","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46743","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46873","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46884","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00238","scoring_system":"epss","scoring_elements":"0.46833","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43227"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43227"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-07-30T17:25:06Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386274","reference_id":"2386274","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386274"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43227"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r857-ke39-xug8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66368?format=json","vulnerability_id":"VCID-stjs-xknd-zfgh","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-66287.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66287","reference_id":"","reference_type":"","scores":[{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14092","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21619","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0007","scoring_system":"epss","scoring_elements":"0.21677","published_at":"2026-04-04T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27562","published_at":"2026-04-21T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27338","published_at":"2026-04-29T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27415","published_at":"2026-04-26T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27521","published_at":"2026-04-24T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27604","published_at":"2026-04-07T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27671","published_at":"2026-04-08T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27714","published_at":"2026-04-09T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27719","published_at":"2026-04-11T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27675","published_at":"2026-04-12T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27617","published_at":"2026-04-13T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.27626","published_at":"2026-04-16T12:55:00Z"},{"value":"0.001","scoring_system":"epss","scoring_elements":"0.276","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-66287"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418857","reference_id":"2418857","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418857"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-66287","reference_id":"CVE-2025-66287","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-66287"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7941-1/","reference_id":"USN-7941-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7941-1/"},{"reference_url":"https://webkitgtk.org/security/WSA-2025-0009.html","reference_id":"WSA-2025-0009.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-04T20:55:04Z/"}],"url":"https://webkitgtk.org/security/WSA-2025-0009.html"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-66287"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-stjs-xknd-zfgh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64219?format=json","vulnerability_id":"VCID-t46t-rhgu-cbc1","summary":"webkitgtk: A website may be able to track users through Safari web extensions","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20676.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20676","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10606","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10683","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10747","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10679","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10735","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10749","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10718","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10555","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10572","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.15918","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16078","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16075","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16036","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00052","scoring_system":"epss","scoring_elements":"0.16188","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20676"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20676"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-17T18:30:37Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448794","reference_id":"2448794","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448794"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20676"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t46t-rhgu-cbc1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64213?format=json","vulnerability_id":"VCID-teue-y6qz-jyfw","summary":"webkitgtk: Processing maliciously crafted web content may disclose internal states of the app","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-46299.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46299","reference_id":"","reference_type":"","scores":[{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0601","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06283","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06046","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0603","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0607","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06109","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.061","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06094","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06086","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06051","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06061","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0621","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06224","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06255","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06264","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-46299"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46299"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125889","reference_id":"125889","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125889"},{"reference_url":"https://support.apple.com/en-us/125890","reference_id":"125890","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125890"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-01-09T22:03:03Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448788","reference_id":"2448788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448788"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-46299"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-teue-y6qz-jyfw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66444?format=json","vulnerability_id":"VCID-u6k6-1hmc-tfaf","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43427.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43427","reference_id":"","reference_type":"","scores":[{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19732","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19456","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19535","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19587","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.1959","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19542","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00063","scoring_system":"epss","scoring_elements":"0.19484","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19862","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19826","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19975","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19857","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19971","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00064","scoring_system":"epss","scoring_elements":"0.19731","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00065","scoring_system":"epss","scoring_elements":"0.20366","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20378","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43427"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:01:33Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416329","reference_id":"2416329","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43427"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u6k6-1hmc-tfaf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64208?format=json","vulnerability_id":"VCID-unu1-sbnm-27bf","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43433.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43433","reference_id":"","reference_type":"","scores":[{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12936","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12942","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.12988","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13027","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13065","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00043","scoring_system":"epss","scoring_elements":"0.13015","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00045","scoring_system":"epss","scoring_elements":"0.14014","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20153","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20413","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.2041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20284","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20279","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00066","scoring_system":"epss","scoring_elements":"0.20244","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43433"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43433"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-05T04:55:28Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448783","reference_id":"2448783","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448783"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43433"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-unu1-sbnm-27bf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/68659?format=json","vulnerability_id":"VCID-vk4e-qufz-5ffp","summary":"angle: insufficient input validation can cause undefined behavior","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-6558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-6558","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37993","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38004","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37984","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44401","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44447","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44381","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44426","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44299","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44302","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44219","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.44092","published_at":"2026-05-05T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-6558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6558"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"5.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380254","reference_id":"2380254","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2380254"},{"reference_url":"https://issues.chromium.org/issues/427162086","reference_id":"427162086","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/"}],"url":"https://issues.chromium.org/issues/427162086"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html","reference_id":"stable-channel-update-for-desktop_15.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-07-22T03:55:29Z/"}],"url":"https://chromereleases.googleblog.com/2025/07/stable-channel-update-for-desktop_15.html"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-6558"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-vk4e-qufz-5ffp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66441?format=json","vulnerability_id":"VCID-w3r3-11kt-2ydu","summary":"webkitgtk: A website may exfiltrate image data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43392.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43392","reference_id":"","reference_type":"","scores":[{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08567","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08649","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08627","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08662","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08664","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0864","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08987","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12255","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12365","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12367","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12483","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12488","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12457","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12346","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43392"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T16:33:14Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416325","reference_id":"2416325","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416325"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://usn.ubuntu.com/7914-1/","reference_id":"USN-7914-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7914-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43392"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w3r3-11kt-2ydu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64218?format=json","vulnerability_id":"VCID-w5gq-k53s-tuc5","summary":"webkitgtk: A remote attacker may be able to cause a denial-of-service","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20652.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20652","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38025","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37947","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37972","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37992","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37981","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3793","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48695","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48832","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.48829","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00255","scoring_system":"epss","scoring_elements":"0.4878","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20652"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20652"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2026-02-12T19:30:51Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448793","reference_id":"2448793","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448793"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20652"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w5gq-k53s-tuc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/67449?format=json","vulnerability_id":"VCID-whma-xbxr-5uay","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43342.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43342","reference_id":"","reference_type":"","scores":[{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52326","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52355","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52366","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5237","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52317","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56104","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56127","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56124","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56122","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00332","scoring_system":"epss","scoring_elements":"0.56087","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62537","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62562","published_at":"2026-04-21T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62573","published_at":"2026-04-24T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62589","published_at":"2026-04-26T12:55:00Z"},{"value":"0.0043","scoring_system":"epss","scoring_elements":"0.62586","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43342"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.6","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125108","reference_id":"125108","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125108"},{"reference_url":"https://support.apple.com/en-us/125109","reference_id":"125109","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125109"},{"reference_url":"https://support.apple.com/en-us/125110","reference_id":"125110","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125110"},{"reference_url":"https://support.apple.com/en-us/125113","reference_id":"125113","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125113"},{"reference_url":"https://support.apple.com/en-us/125114","reference_id":"125114","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125114"},{"reference_url":"https://support.apple.com/en-us/125115","reference_id":"125115","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125115"},{"reference_url":"https://support.apple.com/en-us/125116","reference_id":"125116","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-09-16T13:38:38Z/"}],"url":"https://support.apple.com/en-us/125116"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397627","reference_id":"2397627","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2397627"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17643","reference_id":"RHSA-2025:17643","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17643"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17741","reference_id":"RHSA-2025:17741","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17741"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17743","reference_id":"RHSA-2025:17743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17743"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17802","reference_id":"RHSA-2025:17802","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17802"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:17807","reference_id":"RHSA-2025:17807","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:17807"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:18097","reference_id":"RHSA-2025:18097","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:18097"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19109","reference_id":"RHSA-2025:19109","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19109"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19157","reference_id":"RHSA-2025:19157","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19157"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19165","reference_id":"RHSA-2025:19165","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19165"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:19352","reference_id":"RHSA-2025:19352","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:19352"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:20922","reference_id":"RHSA-2025:20922","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:20922"},{"reference_url":"https://usn.ubuntu.com/7817-1/","reference_id":"USN-7817-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7817-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43342"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-whma-xbxr-5uay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61854?format=json","vulnerability_id":"VCID-wnxh-854z-ykfk","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43211.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43211","reference_id":"","reference_type":"","scores":[{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.05046","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04929","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04981","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04965","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.0491","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04925","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04943","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00019","scoring_system":"epss","scoring_elements":"0.04963","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06309","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06156","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06144","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07114","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.07134","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.0714","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00026","scoring_system":"epss","scoring_elements":"0.071","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43211"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43211"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.2","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-07-30T18:06:53Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386270","reference_id":"2386270","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386270"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43211"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wnxh-854z-ykfk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64211?format=json","vulnerability_id":"VCID-wrt4-z8ne-zffm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43457.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43457","reference_id":"","reference_type":"","scores":[{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08968","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08899","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08977","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.09009","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08972","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00031","scoring_system":"epss","scoring_elements":"0.08959","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00032","scoring_system":"epss","scoring_elements":"0.09336","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.1479","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00048","scoring_system":"epss","scoring_elements":"0.14797","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24303","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24147","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24261","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00084","scoring_system":"epss","scoring_elements":"0.24431","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00086","scoring_system":"epss","scoring_elements":"0.24738","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43457"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43457"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:05:37Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448786","reference_id":"2448786","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448786"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43457"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wrt4-z8ne-zffm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64207?format=json","vulnerability_id":"VCID-x5sh-5xtn-r7cp","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43214.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43214","reference_id":"","reference_type":"","scores":[{"value":"0.00147","scoring_system":"epss","scoring_elements":"0.3515","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36948","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37013","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36999","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37121","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.3696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.36986","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00161","scoring_system":"epss","scoring_elements":"0.37021","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4447","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00218","scoring_system":"epss","scoring_elements":"0.4448","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0038","scoring_system":"epss","scoring_elements":"0.59506","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62116","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62178","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62172","published_at":"2026-04-29T12:55:00Z"},{"value":"0.0046","scoring_system":"epss","scoring_elements":"0.64175","published_at":"2026-04-24T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43214"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43214"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-08-22T03:55:42Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448782","reference_id":"2448782","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43214"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x5sh-5xtn-r7cp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64210?format=json","vulnerability_id":"VCID-xpp8-357g-c7gp","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43441.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43441","reference_id":"","reference_type":"","scores":[{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10558","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10694","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10647","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10671","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10703","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.10689","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00036","scoring_system":"epss","scoring_elements":"0.1063","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1158","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14896","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14981","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.14991","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15041","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.1508","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15081","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00049","scoring_system":"epss","scoring_elements":"0.15025","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43441"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43441"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125633","reference_id":"125633","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125633"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-11-04T13:06:16Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448785","reference_id":"2448785","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448785"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23743"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43441"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xpp8-357g-c7gp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66431?format=json","vulnerability_id":"VCID-xr5y-1ebg-xqcj","summary":"webkit: WebKitGTK / WPE WebKit: Out-of-bounds read and integer underflow vulnerability leading to DoS","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-13502.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13502","reference_id":"","reference_type":"","scores":[{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22587","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22574","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00076","scoring_system":"epss","scoring_elements":"0.22578","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00107","scoring_system":"epss","scoring_elements":"0.28456","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29472","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29546","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29367","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29431","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29498","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29475","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29379","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29399","published_at":"2026-04-16T12:55:00Z"},{"value":"0.0011","scoring_system":"epss","scoring_elements":"0.29373","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00112","scoring_system":"epss","scoring_elements":"0.29702","published_at":"2026-04-21T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-13502"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416300","reference_id":"2416300","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416300"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream","reference_id":"cpe:/a:redhat:enterprise_linux:9::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:enterprise_linux:9::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_aus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_aus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.0::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.0::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_id":"cpe:/a:redhat:rhel_e4s:9.2::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_e4s:9.2::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream","reference_id":"cpe:/a:redhat:rhel_eus:9.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus:9.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_id":"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.6::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.6::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream","reference_id":"cpe:/a:redhat:rhel_tus:8.8::appstream","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/a:redhat:rhel_tus:8.8::appstream"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6","reference_id":"cpe:/o:redhat:enterprise_linux:6","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:6"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7","reference_id":"cpe:/o:redhat:enterprise_linux:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:enterprise_linux:7"},{"reference_url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7","reference_id":"cpe:/o:redhat:rhel_els:7","reference_type":"","scores":[],"url":"https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:/o:redhat:rhel_els:7"},{"reference_url":"https://access.redhat.com/security/cve/CVE-2025-13502","reference_id":"CVE-2025-13502","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/security/cve/CVE-2025-13502"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22789","reference_id":"RHSA-2025:22789","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:22790","reference_id":"RHSA-2025:22790","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:22790"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23110","reference_id":"RHSA-2025:23110","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23110"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23433","reference_id":"RHSA-2025:23433","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23434","reference_id":"RHSA-2025:23434","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23451","reference_id":"RHSA-2025:23451","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23451"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23452","reference_id":"RHSA-2025:23452","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23452"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23583","reference_id":"RHSA-2025:23583","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23583"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23591","reference_id":"RHSA-2025:23591","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23591"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23742","reference_id":"RHSA-2025:23742","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23742"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23743","reference_id":"RHSA-2025:23743","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://access.redhat.com/errata/RHSA-2025:23743"},{"reference_url":"https://bugs.webkit.org/show_bug.cgi?id=302218","reference_id":"show_bug.cgi?id=302218","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-11-25T14:40:21Z/"}],"url":"https://bugs.webkit.org/show_bug.cgi?id=302218"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-13502"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xr5y-1ebg-xqcj"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64214?format=json","vulnerability_id":"VCID-yfww-r9rn-73dy","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-20608.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20608","reference_id":"","reference_type":"","scores":[{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02479","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02467","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02461","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.0248","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02515","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02491","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00014","scoring_system":"epss","scoring_elements":"0.02495","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06389","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06316","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06333","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.0636","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00023","scoring_system":"epss","scoring_elements":"0.06372","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-20608"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-20608"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126346","reference_id":"126346","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126346"},{"reference_url":"https://support.apple.com/en-us/126347","reference_id":"126347","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126347"},{"reference_url":"https://support.apple.com/en-us/126348","reference_id":"126348","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126348"},{"reference_url":"https://support.apple.com/en-us/126353","reference_id":"126353","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126353"},{"reference_url":"https://support.apple.com/en-us/126354","reference_id":"126354","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-02-13T16:21:09Z/"}],"url":"https://support.apple.com/en-us/126354"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448789","reference_id":"2448789","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448789"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-20608"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yfww-r9rn-73dy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61853?format=json","vulnerability_id":"VCID-yg6b-hsst-ckaa","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31278.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31278","reference_id":"","reference_type":"","scores":[{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.2663","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28505","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.2861","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28569","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28699","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28519","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28568","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00105","scoring_system":"epss","scoring_elements":"0.28612","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.3441","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34449","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00142","scoring_system":"epss","scoring_elements":"0.34464","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36139","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36372","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36342","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00158","scoring_system":"epss","scoring_elements":"0.36256","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31278"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31278"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/124147","reference_id":"124147","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124147"},{"reference_url":"https://support.apple.com/en-us/124148","reference_id":"124148","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124148"},{"reference_url":"https://support.apple.com/en-us/124149","reference_id":"124149","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124149"},{"reference_url":"https://support.apple.com/en-us/124152","reference_id":"124152","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124152"},{"reference_url":"https://support.apple.com/en-us/124153","reference_id":"124153","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124153"},{"reference_url":"https://support.apple.com/en-us/124154","reference_id":"124154","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124154"},{"reference_url":"https://support.apple.com/en-us/124155","reference_id":"124155","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-07-31T03:56:02Z/"}],"url":"https://support.apple.com/en-us/124155"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386269","reference_id":"2386269","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2386269"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13780","reference_id":"RHSA-2025:13780","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13780"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:13782","reference_id":"RHSA-2025:13782","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:13782"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14421","reference_id":"RHSA-2025:14421","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14421"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14422","reference_id":"RHSA-2025:14422","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14422"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14423","reference_id":"RHSA-2025:14423","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14423"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14432","reference_id":"RHSA-2025:14432","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14432"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14433","reference_id":"RHSA-2025:14433","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14433"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14434","reference_id":"RHSA-2025:14434","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14434"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:14486","reference_id":"RHSA-2025:14486","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:14486"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:15729","reference_id":"RHSA-2025:15729","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:15729"},{"reference_url":"https://usn.ubuntu.com/7702-1/","reference_id":"USN-7702-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7702-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-31278"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-yg6b-hsst-ckaa"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/65879?format=json","vulnerability_id":"VCID-z7hw-fywx-dffc","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43535.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43535","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11546","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11601","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1139","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11473","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11532","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11542","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11508","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11478","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11339","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14429","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14379","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14434","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14461","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14238","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00047","scoring_system":"epss","scoring_elements":"0.14359","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43535"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125884","reference_id":"125884","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125884"},{"reference_url":"https://support.apple.com/en-us/125885","reference_id":"125885","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125885"},{"reference_url":"https://support.apple.com/en-us/125886","reference_id":"125886","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125886"},{"reference_url":"https://support.apple.com/en-us/125891","reference_id":"125891","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125891"},{"reference_url":"https://support.apple.com/en-us/125892","reference_id":"125892","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-12-17T21:33:55Z/"}],"url":"https://support.apple.com/en-us/125892"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423188","reference_id":"2423188","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2423188"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23663","reference_id":"RHSA-2025:23663","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23663"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23700","reference_id":"RHSA-2025:23700","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23700"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23967","reference_id":"RHSA-2025:23967","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23967"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23968","reference_id":"RHSA-2025:23968","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23968"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23969","reference_id":"RHSA-2025:23969","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23969"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23970","reference_id":"RHSA-2025:23970","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23970"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23971","reference_id":"RHSA-2025:23971","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23971"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23972","reference_id":"RHSA-2025:23972","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23972"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23973","reference_id":"RHSA-2025:23973","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23973"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23974","reference_id":"RHSA-2025:23974","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23974"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:23975","reference_id":"RHSA-2025:23975","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:23975"},{"reference_url":"https://usn.ubuntu.com/7957-1/","reference_id":"USN-7957-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7957-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2025-43535"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-z7hw-fywx-dffc"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/63945?format=json","vulnerability_id":"VCID-zk2j-9hd2-hfcn","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-28857.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28857","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11507","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11349","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11561","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11433","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1149","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11496","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11463","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11434","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.113","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11299","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11422","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11366","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12359","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12447","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00041","scoring_system":"epss","scoring_elements":"0.12564","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2026-28857"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28857"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/126792","reference_id":"126792","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126792"},{"reference_url":"https://support.apple.com/en-us/126794","reference_id":"126794","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126794"},{"reference_url":"https://support.apple.com/en-us/126799","reference_id":"126799","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126799"},{"reference_url":"https://support.apple.com/en-us/126800","reference_id":"126800","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-03-26T14:33:38Z/"}],"url":"https://support.apple.com/en-us/126800"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453004","reference_id":"2453004","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2453004"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:10702","reference_id":"RHSA-2026:10702","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:10702"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11329","reference_id":"RHSA-2026:11329","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11329"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:11814","reference_id":"RHSA-2026:11814","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:11814"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:13845","reference_id":"RHSA-2026:13845","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:13845"},{"reference_url":"https://access.redhat.com/errata/RHSA-2026:9692","reference_id":"RHSA-2026:9692","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2026:9692"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/994533?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.1-1"},{"url":"http://public2.vulnerablecode.io/api/packages/1076492?format=json","purl":"pkg:deb/debian/wpewebkit@2.52.3-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}],"aliases":["CVE-2026-28857"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-zk2j-9hd2-hfcn"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:deb/debian/wpewebkit@2.52.3-1"}