Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-libs/webkit-gtk@2.42.2
Typeebuild
Namespacenet-libs
Namewebkit-gtk
Version2.42.2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.42.3
Latest_non_vulnerable_version4.38.00
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-4kzn-hfnz-3faf
vulnerability_id VCID-4kzn-hfnz-3faf
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40451
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.5062
published_at 2026-04-02T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50658
published_at 2026-04-13T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50602
published_at 2026-04-07T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50657
published_at 2026-04-08T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50653
published_at 2026-04-09T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50695
published_at 2026-04-11T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50673
published_at 2026-04-12T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50647
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40451
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://seclists.org/fulldisclosure/2023/Oct/2
reference_id 2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url http://seclists.org/fulldisclosure/2023/Oct/2
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241409
reference_id 2241409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241409
17
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/3
18
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url https://security.gentoo.org/glsa/202401-33
19
reference_url https://support.apple.com/en-us/HT213941
reference_id HT213941
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url https://support.apple.com/en-us/HT213941
20
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
21
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.2
purl pkg:ebuild/net-libs/webkit-gtk@2.42.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2
aliases CVE-2023-40451
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzn-hfnz-3faf
1
url VCID-br5g-pfa4-33h7
vulnerability_id VCID-br5g-pfa4-33h7
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41074.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41074
reference_id
reference_type
scores
0
value 0.01121
scoring_system epss
scoring_elements 0.78197
published_at 2026-04-02T12:55:00Z
1
value 0.01121
scoring_system epss
scoring_elements 0.78228
published_at 2026-04-04T12:55:00Z
2
value 0.01121
scoring_system epss
scoring_elements 0.78209
published_at 2026-04-07T12:55:00Z
3
value 0.01121
scoring_system epss
scoring_elements 0.78236
published_at 2026-04-08T12:55:00Z
4
value 0.01121
scoring_system epss
scoring_elements 0.78241
published_at 2026-04-09T12:55:00Z
5
value 0.01121
scoring_system epss
scoring_elements 0.78267
published_at 2026-04-11T12:55:00Z
6
value 0.01121
scoring_system epss
scoring_elements 0.7825
published_at 2026-04-12T12:55:00Z
7
value 0.01121
scoring_system epss
scoring_elements 0.78245
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241412
reference_id 2241412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241412
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/6426-1/
reference_id USN-6426-1
reference_type
scores
url https://usn.ubuntu.com/6426-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.2
purl pkg:ebuild/net-libs/webkit-gtk@2.42.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2
aliases CVE-2023-41074
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-br5g-pfa4-33h7
2
url VCID-dafx-64dz-ubfw
vulnerability_id VCID-dafx-64dz-ubfw
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41983
reference_id
reference_type
scores
0
value 0.01108
scoring_system epss
scoring_elements 0.78065
published_at 2026-04-02T12:55:00Z
1
value 0.01108
scoring_system epss
scoring_elements 0.78095
published_at 2026-04-04T12:55:00Z
2
value 0.01108
scoring_system epss
scoring_elements 0.78077
published_at 2026-04-07T12:55:00Z
3
value 0.01108
scoring_system epss
scoring_elements 0.78103
published_at 2026-04-08T12:55:00Z
4
value 0.01108
scoring_system epss
scoring_elements 0.78107
published_at 2026-04-09T12:55:00Z
5
value 0.01108
scoring_system epss
scoring_elements 0.78133
published_at 2026-04-11T12:55:00Z
6
value 0.01108
scoring_system epss
scoring_elements 0.78115
published_at 2026-04-12T12:55:00Z
7
value 0.01108
scoring_system epss
scoring_elements 0.78111
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41983
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271453
reference_id 2271453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271453
6
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
7
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
8
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
9
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
10
reference_url https://usn.ubuntu.com/6490-1/
reference_id USN-6490-1
reference_type
scores
url https://usn.ubuntu.com/6490-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.2
purl pkg:ebuild/net-libs/webkit-gtk@2.42.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2
aliases CVE-2023-41983
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dafx-64dz-ubfw
3
url VCID-f8z1-mtxh-1bhz
vulnerability_id VCID-f8z1-mtxh-1bhz
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32359.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32359.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32359
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27686
published_at 2026-04-02T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27724
published_at 2026-04-04T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27514
published_at 2026-04-07T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27583
published_at 2026-04-08T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27625
published_at 2026-04-09T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.2763
published_at 2026-04-11T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27586
published_at 2026-04-12T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27529
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32359
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271449
reference_id 2271449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271449
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
16
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.2
purl pkg:ebuild/net-libs/webkit-gtk@2.42.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2
aliases CVE-2023-32359
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8z1-mtxh-1bhz
4
url VCID-kj3w-6p1u-87b9
vulnerability_id VCID-kj3w-6p1u-87b9
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39434.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39434.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39434
reference_id
reference_type
scores
0
value 0.00651
scoring_system epss
scoring_elements 0.70793
published_at 2026-04-02T12:55:00Z
1
value 0.00651
scoring_system epss
scoring_elements 0.70838
published_at 2026-04-13T12:55:00Z
2
value 0.00651
scoring_system epss
scoring_elements 0.70812
published_at 2026-04-04T12:55:00Z
3
value 0.00651
scoring_system epss
scoring_elements 0.70787
published_at 2026-04-07T12:55:00Z
4
value 0.00651
scoring_system epss
scoring_elements 0.7083
published_at 2026-04-08T12:55:00Z
5
value 0.00651
scoring_system epss
scoring_elements 0.70846
published_at 2026-04-09T12:55:00Z
6
value 0.00651
scoring_system epss
scoring_elements 0.70869
published_at 2026-04-11T12:55:00Z
7
value 0.00651
scoring_system epss
scoring_elements 0.70853
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39434
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241405
reference_id 2241405
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241405
16
reference_url http://seclists.org/fulldisclosure/2023/Oct/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/
url http://seclists.org/fulldisclosure/2023/Oct/3
17
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/3
18
reference_url http://seclists.org/fulldisclosure/2023/Oct/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/
url http://seclists.org/fulldisclosure/2023/Oct/8
19
reference_url http://seclists.org/fulldisclosure/2023/Oct/9
reference_id 9
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/
url http://seclists.org/fulldisclosure/2023/Oct/9
20
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/
url https://security.gentoo.org/glsa/202401-33
21
reference_url https://support.apple.com/en-us/HT213937
reference_id HT213937
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/
url https://support.apple.com/en-us/HT213937
22
reference_url https://support.apple.com/en-us/HT213938
reference_id HT213938
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/
url https://support.apple.com/en-us/HT213938
23
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:40Z/
url https://support.apple.com/en-us/HT213940
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.2
purl pkg:ebuild/net-libs/webkit-gtk@2.42.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2
aliases CVE-2023-39434
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kj3w-6p1u-87b9
5
url VCID-nhy8-sfpr-eudu
vulnerability_id VCID-nhy8-sfpr-eudu
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35074.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-35074
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69341
published_at 2026-04-02T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69398
published_at 2026-04-13T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69358
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69338
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69388
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69404
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69427
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69411
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-35074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url http://seclists.org/fulldisclosure/2023/Oct/10
reference_id 10
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/10
14
reference_url http://seclists.org/fulldisclosure/2023/Oct/2
reference_id 2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/2
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241403
reference_id 2241403
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241403
16
reference_url http://seclists.org/fulldisclosure/2023/Oct/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/3
17
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/3
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/
reference_id 4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/
19
reference_url http://seclists.org/fulldisclosure/2023/Oct/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/8
20
reference_url http://seclists.org/fulldisclosure/2023/Oct/9
reference_id 9
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/9
21
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://security.gentoo.org/glsa/202401-33
22
reference_url https://support.apple.com/en-us/HT213936
reference_id HT213936
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213936
23
reference_url https://support.apple.com/en-us/HT213937
reference_id HT213937
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213937
24
reference_url https://support.apple.com/en-us/HT213938
reference_id HT213938
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213938
25
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213940
26
reference_url https://support.apple.com/en-us/HT213941
reference_id HT213941
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213941
27
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
28
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.2
purl pkg:ebuild/net-libs/webkit-gtk@2.42.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2
aliases CVE-2023-35074
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nhy8-sfpr-eudu
6
url VCID-r25x-h5yu-quc1
vulnerability_id VCID-r25x-h5yu-quc1
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42890.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42890
reference_id
reference_type
scores
0
value 0.00402
scoring_system epss
scoring_elements 0.60742
published_at 2026-04-02T12:55:00Z
1
value 0.00402
scoring_system epss
scoring_elements 0.60789
published_at 2026-04-13T12:55:00Z
2
value 0.00402
scoring_system epss
scoring_elements 0.60771
published_at 2026-04-04T12:55:00Z
3
value 0.00402
scoring_system epss
scoring_elements 0.60735
published_at 2026-04-07T12:55:00Z
4
value 0.00402
scoring_system epss
scoring_elements 0.60784
published_at 2026-04-08T12:55:00Z
5
value 0.00402
scoring_system epss
scoring_elements 0.60799
published_at 2026-04-09T12:55:00Z
6
value 0.00402
scoring_system epss
scoring_elements 0.6082
published_at 2026-04-11T12:55:00Z
7
value 0.00402
scoring_system epss
scoring_elements 0.60807
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42890
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url http://www.openwall.com/lists/oss-security/2023/12/18/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://www.openwall.com/lists/oss-security/2023/12/18/1
14
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
15
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254327
reference_id 2254327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254327
17
reference_url http://seclists.org/fulldisclosure/2023/Dec/6
reference_id 6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/6
18
reference_url http://seclists.org/fulldisclosure/2023/Dec/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/7
19
reference_url http://seclists.org/fulldisclosure/2023/Dec/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/9
20
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://security.gentoo.org/glsa/202401-33
21
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214035
22
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214036
23
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214039
24
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/kb/HT214039
25
reference_url https://support.apple.com/en-us/HT214040
reference_id HT214040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214040
26
reference_url https://support.apple.com/en-us/HT214041
reference_id HT214041
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214041
27
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
28
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.2
purl pkg:ebuild/net-libs/webkit-gtk@2.42.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2
aliases CVE-2023-42890
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r25x-h5yu-quc1
7
url VCID-uugz-x8q6-fbe4
vulnerability_id VCID-uugz-x8q6-fbe4
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41993.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41993.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41993
reference_id
reference_type
scores
0
value 0.24414
scoring_system epss
scoring_elements 0.96109
published_at 2026-04-13T12:55:00Z
1
value 0.24414
scoring_system epss
scoring_elements 0.96101
published_at 2026-04-08T12:55:00Z
2
value 0.24414
scoring_system epss
scoring_elements 0.96104
published_at 2026-04-09T12:55:00Z
3
value 0.24414
scoring_system epss
scoring_elements 0.96107
published_at 2026-04-12T12:55:00Z
4
value 0.24891
scoring_system epss
scoring_elements 0.96134
published_at 2026-04-04T12:55:00Z
5
value 0.24891
scoring_system epss
scoring_elements 0.96127
published_at 2026-04-02T12:55:00Z
6
value 0.24891
scoring_system epss
scoring_elements 0.96139
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41993
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240522
reference_id 2240522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240522
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/
url https://support.apple.com/en-us/HT213940
16
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
18
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/6426-1/
reference_id USN-6426-1
reference_type
scores
url https://usn.ubuntu.com/6426-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.2
purl pkg:ebuild/net-libs/webkit-gtk@2.42.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2
aliases CVE-2023-41993
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uugz-x8q6-fbe4
8
url VCID-x25m-k9px-2ubs
vulnerability_id VCID-x25m-k9px-2ubs
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39928.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39928
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.38955
published_at 2026-04-02T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38974
published_at 2026-04-04T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.38904
published_at 2026-04-07T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.38957
published_at 2026-04-08T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.38971
published_at 2026-04-09T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.38983
published_at 2026-04-11T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.38945
published_at 2026-04-12T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.38918
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39928
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241400
reference_id 2241400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241400
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
16
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/6426-1/
reference_id USN-6426-1
reference_type
scores
url https://usn.ubuntu.com/6426-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.2
purl pkg:ebuild/net-libs/webkit-gtk@2.42.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2
aliases CVE-2023-39928
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x25m-k9px-2ubs
9
url VCID-x73g-k7yh-qydd
vulnerability_id VCID-x73g-k7yh-qydd
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42852
reference_id
reference_type
scores
0
value 0.02171
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-13T12:55:00Z
1
value 0.02171
scoring_system epss
scoring_elements 0.84267
published_at 2026-04-02T12:55:00Z
2
value 0.02171
scoring_system epss
scoring_elements 0.84325
published_at 2026-04-12T12:55:00Z
3
value 0.02171
scoring_system epss
scoring_elements 0.84332
published_at 2026-04-11T12:55:00Z
4
value 0.02171
scoring_system epss
scoring_elements 0.84314
published_at 2026-04-09T12:55:00Z
5
value 0.02171
scoring_system epss
scoring_elements 0.84287
published_at 2026-04-07T12:55:00Z
6
value 0.02171
scoring_system epss
scoring_elements 0.84286
published_at 2026-04-04T12:55:00Z
7
value 0.02171
scoring_system epss
scoring_elements 0.84309
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/11/15/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://www.openwall.com/lists/oss-security/2023/11/15/1
6
reference_url http://seclists.org/fulldisclosure/2023/Oct/19
reference_id 19
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/19
7
reference_url http://seclists.org/fulldisclosure/2023/Oct/22
reference_id 22
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/22
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271456
reference_id 2271456
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271456
9
reference_url http://seclists.org/fulldisclosure/2023/Oct/23
reference_id 23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/23
10
reference_url http://seclists.org/fulldisclosure/2023/Oct/24
reference_id 24
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/24
11
reference_url http://seclists.org/fulldisclosure/2023/Oct/25
reference_id 25
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/25
12
reference_url http://seclists.org/fulldisclosure/2023/Oct/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/27
13
reference_url https://www.debian.org/security/2023/dsa-5557
reference_id dsa-5557
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://www.debian.org/security/2023/dsa-5557
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://support.apple.com/en-us/HT213981
reference_id HT213981
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213981
16
reference_url https://support.apple.com/en-us/HT213982
reference_id HT213982
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213982
17
reference_url https://support.apple.com/en-us/HT213984
reference_id HT213984
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213984
18
reference_url https://support.apple.com/kb/HT213984
reference_id HT213984
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/kb/HT213984
19
reference_url https://support.apple.com/en-us/HT213986
reference_id HT213986
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213986
20
reference_url https://support.apple.com/en-us/HT213987
reference_id HT213987
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213987
21
reference_url https://support.apple.com/en-us/HT213988
reference_id HT213988
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213988
22
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
23
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
24
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
25
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
26
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
27
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
28
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
29
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
30
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/
reference_id RPPMOWFYZODONTA3RLZOKSGNR4DELGG2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/
reference_id S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/
33
reference_url https://usn.ubuntu.com/6490-1/
reference_id USN-6490-1
reference_type
scores
url https://usn.ubuntu.com/6490-1/
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/
reference_id ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.42.2
purl pkg:ebuild/net-libs/webkit-gtk@2.42.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2
aliases CVE-2023-42852
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x73g-k7yh-qydd
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.42.2