Lookup for vulnerable packages by Package URL.

Purlpkg:ebuild/net-libs/webkit-gtk@2.40.1
Typeebuild
Namespacenet-libs
Namewebkit-gtk
Version2.40.1
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version2.42.2
Latest_non_vulnerable_version4.38.00
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1jqe-8r7j-zfdu
vulnerability_id VCID-1jqe-8r7j-zfdu
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42856.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42856
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40518
published_at 2026-04-08T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40492
published_at 2026-04-13T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40545
published_at 2026-04-04T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40467
published_at 2026-04-07T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40529
published_at 2026-04-09T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40549
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40512
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.openwall.com/lists/oss-security/2022/12/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url http://www.openwall.com/lists/oss-security/2022/12/26/1
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153683
reference_id 2153683
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153683
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/22
reference_id 22
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url http://seclists.org/fulldisclosure/2022/Dec/22
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
15
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
16
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://security.gentoo.org/glsa/202305-32
17
reference_url https://support.apple.com/en-us/HT213516
reference_id HT213516
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://support.apple.com/en-us/HT213516
18
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://support.apple.com/en-us/HT213531
19
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://support.apple.com/en-us/HT213532
20
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://support.apple.com/en-us/HT213535
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://access.redhat.com/errata/RHSA-2023:0016
reference_id RHSA-2023:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0016
23
reference_url https://access.redhat.com/errata/RHSA-2023:0021
reference_id RHSA-2023:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0021
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-42856
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jqe-8r7j-zfdu
1
url VCID-1v5n-s4cf-dkat
vulnerability_id VCID-1v5n-s4cf-dkat
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25361.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25361.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25361
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44064
published_at 2026-04-02T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.44039
published_at 2026-04-13T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.44088
published_at 2026-04-11T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.44019
published_at 2026-04-07T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.4407
published_at 2026-04-08T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44072
published_at 2026-04-09T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44055
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25361
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175103
reference_id 2175103
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175103
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:19:05Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:19:05Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
19
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
20
reference_url https://bugs.webkit.org/show_bug.cgi?id=244249
reference_id show_bug.cgi?id=244249
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:19:05Z/
url https://bugs.webkit.org/show_bug.cgi?id=244249
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-25361
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1v5n-s4cf-dkat
2
url VCID-2dzh-7e8h-rbac
vulnerability_id VCID-2dzh-7e8h-rbac
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25362.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25362.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25362
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44064
published_at 2026-04-02T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.44039
published_at 2026-04-13T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.44019
published_at 2026-04-07T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.4407
published_at 2026-04-08T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.44072
published_at 2026-04-09T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44055
published_at 2026-04-12T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44088
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25362
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175105
reference_id 2175105
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175105
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:25:41Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:25:41Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
19
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
20
reference_url https://bugs.webkit.org/show_bug.cgi?id=244802
reference_id show_bug.cgi?id=244802
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:25:41Z/
url https://bugs.webkit.org/show_bug.cgi?id=244802
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-25362
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2dzh-7e8h-rbac
3
url VCID-4tnr-2yst-m3b8
vulnerability_id VCID-4tnr-2yst-m3b8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46699.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46699.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46699
reference_id
reference_type
scores
0
value 0.00689
scoring_system epss
scoring_elements 0.71715
published_at 2026-04-02T12:55:00Z
1
value 0.00689
scoring_system epss
scoring_elements 0.71747
published_at 2026-04-13T12:55:00Z
2
value 0.00689
scoring_system epss
scoring_elements 0.71733
published_at 2026-04-04T12:55:00Z
3
value 0.00689
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-07T12:55:00Z
4
value 0.00689
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-08T12:55:00Z
5
value 0.00689
scoring_system epss
scoring_elements 0.71758
published_at 2026-04-09T12:55:00Z
6
value 0.00689
scoring_system epss
scoring_elements 0.71782
published_at 2026-04-11T12:55:00Z
7
value 0.00689
scoring_system epss
scoring_elements 0.71765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46699
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156993
reference_id 2156993
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156993
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213532
18
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213535
19
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213536
20
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213537
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-46699
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4tnr-2yst-m3b8
4
url VCID-586h-px4g-77ab
vulnerability_id VCID-586h-px4g-77ab
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23529.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23529
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26122
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25956
published_at 2026-04-13T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26163
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25932
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26051
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26061
published_at 2026-04-11T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26015
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23529
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2169934
reference_id 2169934
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2169934
5
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
6
reference_url https://support.apple.com/en-us/HT213633
reference_id HT213633
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/
url https://support.apple.com/en-us/HT213633
7
reference_url https://support.apple.com/en-us/HT213635
reference_id HT213635
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/
url https://support.apple.com/en-us/HT213635
8
reference_url https://support.apple.com/en-us/HT213638
reference_id HT213638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/
url https://support.apple.com/en-us/HT213638
9
reference_url https://support.apple.com/en-us/HT213673
reference_id HT213673
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/
url https://support.apple.com/en-us/HT213673
10
reference_url https://access.redhat.com/errata/RHSA-2023:0902
reference_id RHSA-2023:0902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0902
11
reference_url https://access.redhat.com/errata/RHSA-2023:0903
reference_id RHSA-2023:0903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0903
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://usn.ubuntu.com/5893-1/
reference_id USN-5893-1
reference_type
scores
url https://usn.ubuntu.com/5893-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-23529
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-586h-px4g-77ab
5
url VCID-68gk-5ng7-17d9
vulnerability_id VCID-68gk-5ng7-17d9
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42867.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42867
reference_id
reference_type
scores
0
value 0.05716
scoring_system epss
scoring_elements 0.90392
published_at 2026-04-02T12:55:00Z
1
value 0.05716
scoring_system epss
scoring_elements 0.90436
published_at 2026-04-12T12:55:00Z
2
value 0.05716
scoring_system epss
scoring_elements 0.90404
published_at 2026-04-04T12:55:00Z
3
value 0.05716
scoring_system epss
scoring_elements 0.90408
published_at 2026-04-07T12:55:00Z
4
value 0.05716
scoring_system epss
scoring_elements 0.90422
published_at 2026-04-08T12:55:00Z
5
value 0.05716
scoring_system epss
scoring_elements 0.90429
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42867
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.openwall.com/lists/oss-security/2022/12/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://www.openwall.com/lists/oss-security/2022/12/26/1
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156989
reference_id 2156989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156989
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
15
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
16
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://security.gentoo.org/glsa/202305-32
17
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213530
18
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213532
19
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213535
20
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213536
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
23
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-42867
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68gk-5ng7-17d9
6
url VCID-6t3m-f99z-1kf6
vulnerability_id VCID-6t3m-f99z-1kf6
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23518
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54207
published_at 2026-04-02T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54271
published_at 2026-04-13T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54238
published_at 2026-04-04T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54213
published_at 2026-04-07T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54265
published_at 2026-04-08T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54261
published_at 2026-04-09T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.5431
published_at 2026-04-11T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54292
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23518
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167715
reference_id 2167715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167715
10
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
11
reference_url https://support.apple.com/en-us/HT213599
reference_id HT213599
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213599
12
reference_url https://support.apple.com/en-us/HT213600
reference_id HT213600
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213600
13
reference_url https://support.apple.com/en-us/HT213601
reference_id HT213601
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213601
14
reference_url https://support.apple.com/en-us/HT213603
reference_id HT213603
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213603
15
reference_url https://support.apple.com/en-us/HT213604
reference_id HT213604
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213604
16
reference_url https://support.apple.com/en-us/HT213605
reference_id HT213605
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213605
17
reference_url https://support.apple.com/en-us/HT213606
reference_id HT213606
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213606
18
reference_url https://support.apple.com/en-us/HT213638
reference_id HT213638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213638
19
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
20
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/5867-1/
reference_id USN-5867-1
reference_type
scores
url https://usn.ubuntu.com/5867-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-23518
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6t3m-f99z-1kf6
7
url VCID-6wkv-5av5-gfhy
vulnerability_id VCID-6wkv-5av5-gfhy
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25360.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25360.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25360
reference_id
reference_type
scores
0
value 0.00207
scoring_system epss
scoring_elements 0.43094
published_at 2026-04-02T12:55:00Z
1
value 0.00207
scoring_system epss
scoring_elements 0.43098
published_at 2026-04-13T12:55:00Z
2
value 0.00207
scoring_system epss
scoring_elements 0.43121
published_at 2026-04-04T12:55:00Z
3
value 0.00207
scoring_system epss
scoring_elements 0.43059
published_at 2026-04-07T12:55:00Z
4
value 0.00207
scoring_system epss
scoring_elements 0.43112
published_at 2026-04-08T12:55:00Z
5
value 0.00207
scoring_system epss
scoring_elements 0.43125
published_at 2026-04-09T12:55:00Z
6
value 0.00207
scoring_system epss
scoring_elements 0.43146
published_at 2026-04-11T12:55:00Z
7
value 0.00207
scoring_system epss
scoring_elements 0.43113
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25360
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175101
reference_id 2175101
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175101
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:11:53Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:11:53Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
19
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
20
reference_url https://bugs.webkit.org/show_bug.cgi?id=242686
reference_id show_bug.cgi?id=242686
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T16:11:53Z/
url https://bugs.webkit.org/show_bug.cgi?id=242686
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-25360
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6wkv-5av5-gfhy
8
url VCID-85na-58dz-53hb
vulnerability_id VCID-85na-58dz-53hb
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27932.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27932
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01744
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01753
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01758
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01761
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.0177
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01765
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01755
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236843
reference_id 2236843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236843
14
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
15
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213670
16
reference_url https://support.apple.com/en-us/HT213671
reference_id HT213671
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213671
17
reference_url https://support.apple.com/en-us/HT213674
reference_id HT213674
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213674
18
reference_url https://support.apple.com/en-us/HT213676
reference_id HT213676
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213676
19
reference_url https://support.apple.com/en-us/HT213678
reference_id HT213678
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213678
20
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
21
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-27932
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-85na-58dz-53hb
9
url VCID-auzh-b1y3-nkfs
vulnerability_id VCID-auzh-b1y3-nkfs
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25363.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25363.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25363
reference_id
reference_type
scores
0
value 0.00215
scoring_system epss
scoring_elements 0.44064
published_at 2026-04-02T12:55:00Z
1
value 0.00215
scoring_system epss
scoring_elements 0.44039
published_at 2026-04-13T12:55:00Z
2
value 0.00215
scoring_system epss
scoring_elements 0.44019
published_at 2026-04-07T12:55:00Z
3
value 0.00215
scoring_system epss
scoring_elements 0.4407
published_at 2026-04-08T12:55:00Z
4
value 0.00215
scoring_system epss
scoring_elements 0.44072
published_at 2026-04-09T12:55:00Z
5
value 0.00215
scoring_system epss
scoring_elements 0.44055
published_at 2026-04-12T12:55:00Z
6
value 0.00215
scoring_system epss
scoring_elements 0.44088
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25363
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175107
reference_id 2175107
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175107
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:24:00Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:24:00Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
19
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
20
reference_url https://bugs.webkit.org/show_bug.cgi?id=242684
reference_id show_bug.cgi?id=242684
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T17:24:00Z/
url https://bugs.webkit.org/show_bug.cgi?id=242684
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-25363
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-auzh-b1y3-nkfs
10
url VCID-bmta-jy4b-mugh
vulnerability_id VCID-bmta-jy4b-mugh
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23517
reference_id
reference_type
scores
0
value 0.00213
scoring_system epss
scoring_elements 0.43808
published_at 2026-04-02T12:55:00Z
1
value 0.00213
scoring_system epss
scoring_elements 0.43787
published_at 2026-04-13T12:55:00Z
2
value 0.00213
scoring_system epss
scoring_elements 0.43832
published_at 2026-04-04T12:55:00Z
3
value 0.00213
scoring_system epss
scoring_elements 0.43763
published_at 2026-04-07T12:55:00Z
4
value 0.00213
scoring_system epss
scoring_elements 0.43814
published_at 2026-04-08T12:55:00Z
5
value 0.00213
scoring_system epss
scoring_elements 0.43818
published_at 2026-04-09T12:55:00Z
6
value 0.00213
scoring_system epss
scoring_elements 0.43836
published_at 2026-04-11T12:55:00Z
7
value 0.00213
scoring_system epss
scoring_elements 0.43804
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167717
reference_id 2167717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167717
10
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
11
reference_url https://support.apple.com/en-us/HT213599
reference_id HT213599
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213599
12
reference_url https://support.apple.com/en-us/HT213600
reference_id HT213600
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213600
13
reference_url https://support.apple.com/en-us/HT213601
reference_id HT213601
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213601
14
reference_url https://support.apple.com/en-us/HT213603
reference_id HT213603
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213603
15
reference_url https://support.apple.com/en-us/HT213604
reference_id HT213604
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213604
16
reference_url https://support.apple.com/en-us/HT213605
reference_id HT213605
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213605
17
reference_url https://support.apple.com/en-us/HT213606
reference_id HT213606
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213606
18
reference_url https://support.apple.com/en-us/HT213638
reference_id HT213638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213638
19
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
20
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/5867-1/
reference_id USN-5867-1
reference_type
scores
url https://usn.ubuntu.com/5867-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-23517
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bmta-jy4b-mugh
11
url VCID-btcm-r2s6-vubj
vulnerability_id VCID-btcm-r2s6-vubj
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28205.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28205
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21077
published_at 2026-04-13T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21099
published_at 2026-04-08T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.2116
published_at 2026-04-09T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21171
published_at 2026-04-11T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21128
published_at 2026-04-12T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.2621
published_at 2026-04-04T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-07T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29806
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28205
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2185724
reference_id 2185724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2185724
14
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
15
reference_url https://support.apple.com/en-us/HT213720
reference_id HT213720
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/
url https://support.apple.com/en-us/HT213720
16
reference_url https://support.apple.com/en-us/HT213721
reference_id HT213721
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/
url https://support.apple.com/en-us/HT213721
17
reference_url https://support.apple.com/en-us/HT213722
reference_id HT213722
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/
url https://support.apple.com/en-us/HT213722
18
reference_url https://support.apple.com/en-us/HT213723
reference_id HT213723
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/
url https://support.apple.com/en-us/HT213723
19
reference_url https://access.redhat.com/errata/RHSA-2023:1918
reference_id RHSA-2023:1918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1918
20
reference_url https://access.redhat.com/errata/RHSA-2023:1919
reference_id RHSA-2023:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1919
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-28205
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-btcm-r2s6-vubj
12
url VCID-c4mn-f4k4-wqe9
vulnerability_id VCID-c4mn-f4k4-wqe9
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32886.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32886
reference_id
reference_type
scores
0
value 0.00876
scoring_system epss
scoring_elements 0.75296
published_at 2026-04-13T12:55:00Z
1
value 0.00876
scoring_system epss
scoring_elements 0.75246
published_at 2026-04-02T12:55:00Z
2
value 0.00876
scoring_system epss
scoring_elements 0.75278
published_at 2026-04-04T12:55:00Z
3
value 0.00876
scoring_system epss
scoring_elements 0.75255
published_at 2026-04-07T12:55:00Z
4
value 0.00876
scoring_system epss
scoring_elements 0.75298
published_at 2026-04-08T12:55:00Z
5
value 0.00876
scoring_system epss
scoring_elements 0.75308
published_at 2026-04-09T12:55:00Z
6
value 0.00876
scoring_system epss
scoring_elements 0.75329
published_at 2026-04-11T12:55:00Z
7
value 0.00876
scoring_system epss
scoring_elements 0.75307
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2128643
reference_id 2128643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2128643
16
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
17
reference_url http://seclists.org/fulldisclosure/2022/Oct/39
reference_id 39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url http://seclists.org/fulldisclosure/2022/Oct/39
18
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/
reference_id 74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/
20
reference_url https://security.archlinux.org/AVG-2819
reference_id AVG-2819
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2819
21
reference_url https://security.archlinux.org/AVG-2820
reference_id AVG-2820
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2820
22
reference_url https://www.debian.org/security/2022/dsa-5240
reference_id dsa-5240
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://www.debian.org/security/2022/dsa-5240
23
reference_url https://www.debian.org/security/2022/dsa-5241
reference_id dsa-5241
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://www.debian.org/security/2022/dsa-5241
24
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://security.gentoo.org/glsa/202305-32
25
reference_url https://support.apple.com/en-us/HT213442
reference_id HT213442
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://support.apple.com/en-us/HT213442
26
reference_url https://support.apple.com/en-us/HT213445
reference_id HT213445
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://support.apple.com/en-us/HT213445
27
reference_url https://support.apple.com/en-us/HT213446
reference_id HT213446
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://support.apple.com/en-us/HT213446
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/
reference_id KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/
29
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html
30
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
31
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
32
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
33
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/
reference_id TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/
34
reference_url https://usn.ubuntu.com/5642-1/
reference_id USN-5642-1
reference_type
scores
url https://usn.ubuntu.com/5642-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-32886
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4mn-f4k4-wqe9
13
url VCID-cc7v-7r6y-nkcp
vulnerability_id VCID-cc7v-7r6y-nkcp
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25358.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25358.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25358
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.37082
published_at 2026-04-02T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.36955
published_at 2026-04-13T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.37116
published_at 2026-04-04T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.36943
published_at 2026-04-07T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.36994
published_at 2026-04-08T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37007
published_at 2026-04-09T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.37016
published_at 2026-04-11T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.36981
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25358
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175099
reference_id 2175099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175099
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/
reference_id 5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/
reference_id 6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/
19
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://security.gentoo.org/glsa/202305-32
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/
reference_id KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://bugs.webkit.org/show_bug.cgi?id=242683
reference_id show_bug.cgi?id=242683
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://bugs.webkit.org/show_bug.cgi?id=242683
25
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-25358
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cc7v-7r6y-nkcp
14
url VCID-cjg6-jkzc-uyg8
vulnerability_id VCID-cjg6-jkzc-uyg8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46700.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46700
reference_id
reference_type
scores
0
value 0.00689
scoring_system epss
scoring_elements 0.71715
published_at 2026-04-02T12:55:00Z
1
value 0.00689
scoring_system epss
scoring_elements 0.71747
published_at 2026-04-13T12:55:00Z
2
value 0.00689
scoring_system epss
scoring_elements 0.71733
published_at 2026-04-04T12:55:00Z
3
value 0.00689
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-07T12:55:00Z
4
value 0.00689
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-08T12:55:00Z
5
value 0.00689
scoring_system epss
scoring_elements 0.71758
published_at 2026-04-09T12:55:00Z
6
value 0.00689
scoring_system epss
scoring_elements 0.71782
published_at 2026-04-11T12:55:00Z
7
value 0.00689
scoring_system epss
scoring_elements 0.71765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156994
reference_id 2156994
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156994
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213531
18
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213532
19
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213535
20
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213536
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
23
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-46700
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjg6-jkzc-uyg8
15
url VCID-dsb1-yxm6-dkcf
vulnerability_id VCID-dsb1-yxm6-dkcf
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42824.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42824
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08383
published_at 2026-04-09T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.0833
published_at 2026-04-02T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08366
published_at 2026-04-08T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08303
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09601
published_at 2026-04-13T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09648
published_at 2026-04-11T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09617
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140504
reference_id 2140504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140504
8
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
reference_id 5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
reference_id AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
11
reference_url https://www.debian.org/security/2022/dsa-5273
reference_id dsa-5273
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://www.debian.org/security/2022/dsa-5273
12
reference_url https://www.debian.org/security/2022/dsa-5274
reference_id dsa-5274
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://www.debian.org/security/2022/dsa-5274
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213488
15
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213489
16
reference_url https://support.apple.com/en-us/HT213491
reference_id HT213491
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213491
17
reference_url https://support.apple.com/en-us/HT213492
reference_id HT213492
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213492
18
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213495
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
reference_id JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
20
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-42824
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dsb1-yxm6-dkcf
16
url VCID-e695-3zce-rfay
vulnerability_id VCID-e695-3zce-rfay
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46691.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46691
reference_id
reference_type
scores
0
value 0.00408
scoring_system epss
scoring_elements 0.61159
published_at 2026-04-02T12:55:00Z
1
value 0.00408
scoring_system epss
scoring_elements 0.61205
published_at 2026-04-13T12:55:00Z
2
value 0.00408
scoring_system epss
scoring_elements 0.61187
published_at 2026-04-04T12:55:00Z
3
value 0.00408
scoring_system epss
scoring_elements 0.61153
published_at 2026-04-07T12:55:00Z
4
value 0.00408
scoring_system epss
scoring_elements 0.61201
published_at 2026-04-08T12:55:00Z
5
value 0.00408
scoring_system epss
scoring_elements 0.61216
published_at 2026-04-09T12:55:00Z
6
value 0.00408
scoring_system epss
scoring_elements 0.61236
published_at 2026-04-11T12:55:00Z
7
value 0.00408
scoring_system epss
scoring_elements 0.61223
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
8
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156990
reference_id 2156990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156990
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213530
15
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213531
16
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213532
17
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213535
18
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213536
19
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213537
20
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
21
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-46691
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e695-3zce-rfay
17
url VCID-ex1v-8bhw-5yfm
vulnerability_id VCID-ex1v-8bhw-5yfm
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32923.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32923
reference_id
reference_type
scores
0
value 0.00236
scoring_system epss
scoring_elements 0.46563
published_at 2026-04-04T12:55:00Z
1
value 0.00236
scoring_system epss
scoring_elements 0.46544
published_at 2026-04-02T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46567
published_at 2026-04-09T12:55:00Z
3
value 0.00236
scoring_system epss
scoring_elements 0.46512
published_at 2026-04-07T12:55:00Z
4
value 0.00268
scoring_system epss
scoring_elements 0.50234
published_at 2026-04-13T12:55:00Z
5
value 0.00268
scoring_system epss
scoring_elements 0.50272
published_at 2026-04-11T12:55:00Z
6
value 0.00268
scoring_system epss
scoring_elements 0.50245
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32923
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140502
reference_id 2140502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140502
16
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213488
19
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213489
20
reference_url https://support.apple.com/en-us/HT213490
reference_id HT213490
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213490
21
reference_url https://support.apple.com/en-us/HT213491
reference_id HT213491
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213491
22
reference_url https://support.apple.com/en-us/HT213492
reference_id HT213492
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213492
23
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213495
24
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
25
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-32923
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1v-8bhw-5yfm
18
url VCID-fknw-h7xk-gkbt
vulnerability_id VCID-fknw-h7xk-gkbt
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42852.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42852
reference_id
reference_type
scores
0
value 0.00846
scoring_system epss
scoring_elements 0.7478
published_at 2026-04-02T12:55:00Z
1
value 0.00846
scoring_system epss
scoring_elements 0.74821
published_at 2026-04-13T12:55:00Z
2
value 0.00846
scoring_system epss
scoring_elements 0.74807
published_at 2026-04-04T12:55:00Z
3
value 0.00846
scoring_system epss
scoring_elements 0.74781
published_at 2026-04-07T12:55:00Z
4
value 0.00846
scoring_system epss
scoring_elements 0.74814
published_at 2026-04-08T12:55:00Z
5
value 0.00846
scoring_system epss
scoring_elements 0.74828
published_at 2026-04-09T12:55:00Z
6
value 0.00846
scoring_system epss
scoring_elements 0.74852
published_at 2026-04-11T12:55:00Z
7
value 0.00846
scoring_system epss
scoring_elements 0.74831
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156986
reference_id 2156986
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156986
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
15
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
16
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://security.gentoo.org/glsa/202305-32
17
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213530
18
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213531
19
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213532
20
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213535
21
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213536
22
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213537
23
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
24
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-42852
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fknw-h7xk-gkbt
19
url VCID-hye4-wr18-5fbh
vulnerability_id VCID-hye4-wr18-5fbh
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46692.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46692
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02411
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02415
published_at 2026-04-13T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02422
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.0242
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02424
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02445
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46692
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156991
reference_id 2156991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156991
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213531
18
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213532
19
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213535
20
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213536
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://support.apple.com/en-us/HT213538
reference_id HT213538
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213538
23
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
24
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-46692
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hye4-wr18-5fbh
20
url VCID-ma6z-vrhf-mqdw
vulnerability_id VCID-ma6z-vrhf-mqdw
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42823.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42823
reference_id
reference_type
scores
0
value 0.00631
scoring_system epss
scoring_elements 0.70264
published_at 2026-04-04T12:55:00Z
1
value 0.00631
scoring_system epss
scoring_elements 0.70246
published_at 2026-04-02T12:55:00Z
2
value 0.00631
scoring_system epss
scoring_elements 0.70302
published_at 2026-04-09T12:55:00Z
3
value 0.00631
scoring_system epss
scoring_elements 0.70287
published_at 2026-04-08T12:55:00Z
4
value 0.00631
scoring_system epss
scoring_elements 0.7024
published_at 2026-04-07T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72322
published_at 2026-04-13T12:55:00Z
6
value 0.00714
scoring_system epss
scoring_elements 0.7235
published_at 2026-04-11T12:55:00Z
7
value 0.00714
scoring_system epss
scoring_elements 0.72334
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140505
reference_id 2140505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140505
8
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
reference_id 5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
reference_id AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
11
reference_url https://www.debian.org/security/2022/dsa-5273
reference_id dsa-5273
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://www.debian.org/security/2022/dsa-5273
12
reference_url https://www.debian.org/security/2022/dsa-5274
reference_id dsa-5274
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://www.debian.org/security/2022/dsa-5274
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213488
15
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213489
16
reference_url https://support.apple.com/en-us/HT213491
reference_id HT213491
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213491
17
reference_url https://support.apple.com/en-us/HT213492
reference_id HT213492
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213492
18
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213495
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
reference_id JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
20
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-42823
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ma6z-vrhf-mqdw
21
url VCID-maw9-2k6n-wyea
vulnerability_id VCID-maw9-2k6n-wyea
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42826.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42826
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.2786
published_at 2026-04-13T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27852
published_at 2026-04-07T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27919
published_at 2026-04-12T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.2796
published_at 2026-04-09T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27962
published_at 2026-04-11T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28491
published_at 2026-04-02T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28534
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42826
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167716
reference_id 2167716
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167716
10
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://security.gentoo.org/glsa/202305-32
11
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://support.apple.com/en-us/HT213488
12
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://support.apple.com/en-us/HT213489
13
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://support.apple.com/en-us/HT213495
14
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
15
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/5867-1/
reference_id USN-5867-1
reference_type
scores
url https://usn.ubuntu.com/5867-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-42826
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-maw9-2k6n-wyea
22
url VCID-nykh-jh9p-4bhy
vulnerability_id VCID-nykh-jh9p-4bhy
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42863.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42863
reference_id
reference_type
scores
0
value 0.01018
scoring_system epss
scoring_elements 0.77131
published_at 2026-04-02T12:55:00Z
1
value 0.01018
scoring_system epss
scoring_elements 0.77186
published_at 2026-04-13T12:55:00Z
2
value 0.01018
scoring_system epss
scoring_elements 0.7716
published_at 2026-04-04T12:55:00Z
3
value 0.01018
scoring_system epss
scoring_elements 0.77142
published_at 2026-04-07T12:55:00Z
4
value 0.01018
scoring_system epss
scoring_elements 0.77174
published_at 2026-04-08T12:55:00Z
5
value 0.01018
scoring_system epss
scoring_elements 0.77183
published_at 2026-04-09T12:55:00Z
6
value 0.01018
scoring_system epss
scoring_elements 0.7721
published_at 2026-04-11T12:55:00Z
7
value 0.01018
scoring_system epss
scoring_elements 0.77189
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42863
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.openwall.com/lists/oss-security/2022/12/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://www.openwall.com/lists/oss-security/2022/12/26/1
16
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156987
reference_id 2156987
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156987
18
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
19
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
20
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
21
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://security.gentoo.org/glsa/202305-32
22
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213530
23
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213532
24
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213535
25
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213536
26
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213537
27
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
28
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-42863
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nykh-jh9p-4bhy
23
url VCID-ryxv-e8de-q7h8
vulnerability_id VCID-ryxv-e8de-q7h8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42799.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42799
reference_id
reference_type
scores
0
value 0.00462
scoring_system epss
scoring_elements 0.64205
published_at 2026-04-02T12:55:00Z
1
value 0.00462
scoring_system epss
scoring_elements 0.64233
published_at 2026-04-04T12:55:00Z
2
value 0.00462
scoring_system epss
scoring_elements 0.64194
published_at 2026-04-07T12:55:00Z
3
value 0.00462
scoring_system epss
scoring_elements 0.64244
published_at 2026-04-08T12:55:00Z
4
value 0.00462
scoring_system epss
scoring_elements 0.6426
published_at 2026-04-09T12:55:00Z
5
value 0.00523
scoring_system epss
scoring_elements 0.6692
published_at 2026-04-13T12:55:00Z
6
value 0.00523
scoring_system epss
scoring_elements 0.66964
published_at 2026-04-11T12:55:00Z
7
value 0.00523
scoring_system epss
scoring_elements 0.66951
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140503
reference_id 2140503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140503
8
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
9
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
10
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-42799
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ryxv-e8de-q7h8
24
url VCID-shfm-129h-47ha
vulnerability_id VCID-shfm-129h-47ha
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32885
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40756
published_at 2026-04-02T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40731
published_at 2026-04-13T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40784
published_at 2026-04-11T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40708
published_at 2026-04-07T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40758
published_at 2026-04-08T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40765
published_at 2026-04-09T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.4075
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236842
reference_id 2236842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236842
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213341
reference_id HT213341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/
url https://support.apple.com/en-us/HT213341
15
reference_url https://support.apple.com/en-us/HT213346
reference_id HT213346
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/
url https://support.apple.com/en-us/HT213346
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
19
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
20
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
23
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
24
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
25
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-32885
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shfm-129h-47ha
25
url VCID-tmt1-qwc9-nfhs
vulnerability_id VCID-tmt1-qwc9-nfhs
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46698.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46698
reference_id
reference_type
scores
0
value 0.00969
scoring_system epss
scoring_elements 0.76564
published_at 2026-04-02T12:55:00Z
1
value 0.00969
scoring_system epss
scoring_elements 0.76613
published_at 2026-04-13T12:55:00Z
2
value 0.00969
scoring_system epss
scoring_elements 0.76593
published_at 2026-04-04T12:55:00Z
3
value 0.00969
scoring_system epss
scoring_elements 0.76573
published_at 2026-04-07T12:55:00Z
4
value 0.00969
scoring_system epss
scoring_elements 0.76605
published_at 2026-04-08T12:55:00Z
5
value 0.00969
scoring_system epss
scoring_elements 0.76617
published_at 2026-04-09T12:55:00Z
6
value 0.00969
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-11T12:55:00Z
7
value 0.00969
scoring_system epss
scoring_elements 0.76623
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156992
reference_id 2156992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156992
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213532
18
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213535
19
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213536
20
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213537
21
reference_url https://support.apple.com/en-us/HT213538
reference_id HT213538
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213538
22
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
23
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-46698
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmt1-qwc9-nfhs
26
url VCID-wfjx-2djn-tket
vulnerability_id VCID-wfjx-2djn-tket
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32891.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32891
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25054
published_at 2026-04-13T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25209
published_at 2026-04-02T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.2525
published_at 2026-04-04T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25021
published_at 2026-04-07T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25089
published_at 2026-04-08T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25134
published_at 2026-04-09T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25149
published_at 2026-04-11T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25107
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32891
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2128647
reference_id 2128647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2128647
7
reference_url https://security.archlinux.org/AVG-2819
reference_id AVG-2819
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2819
8
reference_url https://security.archlinux.org/AVG-2820
reference_id AVG-2820
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2820
9
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/
url https://security.gentoo.org/glsa/202305-32
10
reference_url https://support.apple.com/en-us/HT213442
reference_id HT213442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/
url https://support.apple.com/en-us/HT213442
11
reference_url https://support.apple.com/en-us/HT213446
reference_id HT213446
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/
url https://support.apple.com/en-us/HT213446
12
reference_url https://support.apple.com/en-us/HT213486
reference_id HT213486
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/
url https://support.apple.com/en-us/HT213486
13
reference_url https://support.apple.com/en-us/HT213487
reference_id HT213487
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/
url https://support.apple.com/en-us/HT213487
14
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
15
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-32891
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfjx-2djn-tket
27
url VCID-xzgb-egkw-9kdn
vulnerability_id VCID-xzgb-egkw-9kdn
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32888.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32888.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32888
reference_id
reference_type
scores
0
value 0.00702
scoring_system epss
scoring_elements 0.7202
published_at 2026-04-04T12:55:00Z
1
value 0.00702
scoring_system epss
scoring_elements 0.72
published_at 2026-04-02T12:55:00Z
2
value 0.00702
scoring_system epss
scoring_elements 0.72046
published_at 2026-04-09T12:55:00Z
3
value 0.00702
scoring_system epss
scoring_elements 0.72034
published_at 2026-04-08T12:55:00Z
4
value 0.00702
scoring_system epss
scoring_elements 0.71995
published_at 2026-04-07T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73935
published_at 2026-04-13T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73961
published_at 2026-04-11T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32888
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140501
reference_id 2140501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140501
16
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://support.apple.com/en-us/HT213443
reference_id HT213443
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213443
19
reference_url https://support.apple.com/en-us/HT213444
reference_id HT213444
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213444
20
reference_url https://support.apple.com/en-us/HT213445
reference_id HT213445
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213445
21
reference_url https://support.apple.com/en-us/HT213446
reference_id HT213446
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213446
22
reference_url https://support.apple.com/en-us/HT213486
reference_id HT213486
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213486
23
reference_url https://support.apple.com/en-us/HT213487
reference_id HT213487
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213487
24
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213488
25
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
26
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
28
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2022-32888
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzgb-egkw-9kdn
28
url VCID-ygd8-6k3t-quck
vulnerability_id VCID-ygd8-6k3t-quck
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27954.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27954
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.4075
published_at 2026-04-02T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40725
published_at 2026-04-13T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40778
published_at 2026-04-11T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40702
published_at 2026-04-07T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40752
published_at 2026-04-08T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40759
published_at 2026-04-09T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40743
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236844
reference_id 2236844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236844
14
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
15
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213670
16
reference_url https://support.apple.com/en-us/HT213671
reference_id HT213671
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213671
17
reference_url https://support.apple.com/en-us/HT213673
reference_id HT213673
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213673
18
reference_url https://support.apple.com/en-us/HT213674
reference_id HT213674
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213674
19
reference_url https://support.apple.com/en-us/HT213676
reference_id HT213676
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213676
20
reference_url https://support.apple.com/en-us/HT213678
reference_id HT213678
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213678
21
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
22
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
0
url pkg:ebuild/net-libs/webkit-gtk@2.40.1
purl pkg:ebuild/net-libs/webkit-gtk@2.40.1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1
aliases CVE-2023-27954
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ygd8-6k3t-quck
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.40.1