{"url":"http://public2.vulnerablecode.io/api/packages/371661?format=json","purl":"pkg:alpm/archlinux/webkit2gtk@2.49.1-1","type":"alpm","namespace":"archlinux","name":"webkit2gtk","version":"2.49.1-1","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69654?format=json","vulnerability_id":"VCID-c4np-b4zq-tkch","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31204","reference_id":"","reference_type":"","scores":[{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71229","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71245","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366500","reference_id":"2366500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366500"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371661?format=json","purl":"pkg:alpm/archlinux/webkit2gtk@2.49.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/webkit2gtk@2.49.1-1"}],"aliases":["CVE-2025-31204"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4np-b4zq-tkch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69657?format=json","vulnerability_id":"VCID-c9mb-24v2-q3ba","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31215","reference_id":"","reference_type":"","scores":[{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78247","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78256","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31215"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366503","reference_id":"2366503","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366503"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371661?format=json","purl":"pkg:alpm/archlinux/webkit2gtk@2.49.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/webkit2gtk@2.49.1-1"}],"aliases":["CVE-2025-31215"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mb-24v2-q3ba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69656?format=json","vulnerability_id":"VCID-ey9n-zksh-mbfm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31206","reference_id":"","reference_type":"","scores":[{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78155","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366502","reference_id":"2366502","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366502"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371661?format=json","purl":"pkg:alpm/archlinux/webkit2gtk@2.49.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/webkit2gtk@2.49.1-1"}],"aliases":["CVE-2025-31206"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ey9n-zksh-mbfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69658?format=json","vulnerability_id":"VCID-fzqz-yfn1-7yfd","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31257","reference_id":"","reference_type":"","scores":[{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7403","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73989","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74015","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.73986","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.7402","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74034","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74056","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00799","scoring_system":"epss","scoring_elements":"0.74037","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31257"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"4.7","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366504","reference_id":"2366504","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366504"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7995","reference_id":"RHSA-2025:7995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8046","reference_id":"RHSA-2025:8046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8530","reference_id":"RHSA-2025:8530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8532","reference_id":"RHSA-2025:8532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8533","reference_id":"RHSA-2025:8533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8534","reference_id":"RHSA-2025:8534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8541","reference_id":"RHSA-2025:8541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8600","reference_id":"RHSA-2025:8600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8600"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371661?format=json","purl":"pkg:alpm/archlinux/webkit2gtk@2.49.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/webkit2gtk@2.49.1-1"}],"aliases":["CVE-2025-31257"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fzqz-yfn1-7yfd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69653?format=json","vulnerability_id":"VCID-kdvu-rhgt-xqat","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24223","reference_id":"","reference_type":"","scores":[{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45853","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45859","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45878","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45848","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366499","reference_id":"2366499","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366499"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371661?format=json","purl":"pkg:alpm/archlinux/webkit2gtk@2.49.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/webkit2gtk@2.49.1-1"}],"aliases":["CVE-2025-24223"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdvu-rhgt-xqat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69655?format=json","vulnerability_id":"VCID-ksq5-ygcp-nbaz","summary":"webkitgtk: A malicious website may exfiltrate data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31205","reference_id":"","reference_type":"","scores":[{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37915","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37994","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.38019","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37898","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37949","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.37978","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00168","scoring_system":"epss","scoring_elements":"0.3794","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366501","reference_id":"2366501","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366501"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:7995","reference_id":"RHSA-2025:7995","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:7995"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8046","reference_id":"RHSA-2025:8046","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8046"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8530","reference_id":"RHSA-2025:8530","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8530"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8532","reference_id":"RHSA-2025:8532","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8532"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8533","reference_id":"RHSA-2025:8533","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8533"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8534","reference_id":"RHSA-2025:8534","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8534"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8541","reference_id":"RHSA-2025:8541","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8541"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:8600","reference_id":"RHSA-2025:8600","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:8600"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/371661?format=json","purl":"pkg:alpm/archlinux/webkit2gtk@2.49.1-1","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/webkit2gtk@2.49.1-1"}],"aliases":["CVE-2025-31205"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ksq5-ygcp-nbaz"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:alpm/archlinux/webkit2gtk@2.49.1-1"}