{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","type":"ebuild","namespace":"net-libs","name":"webkit-gtk","version":"2.36.7","qualifiers":{},"subpath":"","is_vulnerable":false,"next_non_vulnerable_version":"2.40.1","latest_non_vulnerable_version":"4.38.00","affected_by_vulnerabilities":[],"fixing_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62517?format=json","vulnerability_id":"VCID-48jv-7tnc-8fb3","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22620.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22620.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22620","reference_id":"","reference_type":"","scores":[{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88588","published_at":"2026-05-15T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.8848","published_at":"2026-04-18T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88478","published_at":"2026-04-21T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88495","published_at":"2026-04-24T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88501","published_at":"2026-04-26T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.885","published_at":"2026-04-29T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88511","published_at":"2026-05-05T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88527","published_at":"2026-05-07T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88542","published_at":"2026-05-09T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88539","published_at":"2026-05-11T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88552","published_at":"2026-05-12T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.8858","published_at":"2026-05-14T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.8843","published_at":"2026-04-02T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88438","published_at":"2026-04-04T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88442","published_at":"2026-04-07T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.8846","published_at":"2026-04-08T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88466","published_at":"2026-04-09T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88477","published_at":"2026-04-11T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88469","published_at":"2026-04-13T12:55:00Z"},{"value":"0.04022","scoring_system":"epss","scoring_elements":"0.88483","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22620"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056474","reference_id":"2056474","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2056474"},{"reference_url":"https://security.archlinux.org/AVG-2649","reference_id":"AVG-2649","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2649"},{"reference_url":"https://security.archlinux.org/AVG-2650","reference_id":"AVG-2650","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2650"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/"}],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213091","reference_id":"HT213091","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/"}],"url":"https://support.apple.com/en-us/HT213091"},{"reference_url":"https://support.apple.com/en-us/HT213092","reference_id":"HT213092","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/"}],"url":"https://support.apple.com/en-us/HT213092"},{"reference_url":"https://support.apple.com/en-us/HT213093","reference_id":"HT213093","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/"}],"url":"https://support.apple.com/en-us/HT213093"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-22620"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-48jv-7tnc-8fb3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62522?format=json","vulnerability_id":"VCID-6dgz-w5ga-abb5","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22677.json","reference_id":"","reference_type":"","scores":[{"value":"3.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22677.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22677","reference_id":"","reference_type":"","scores":[{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39763","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.3975","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39741","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00181","scoring_system":"epss","scoring_elements":"0.39681","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42408","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42428","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42285","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42361","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42378","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42302","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42329","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42395","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42658","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42622","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42593","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42653","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42639","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42573","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42511","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00204","scoring_system":"epss","scoring_elements":"0.42512","published_at":"2026-04-26T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104788","reference_id":"2104788","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104788"},{"reference_url":"https://security.archlinux.org/AVG-2779","reference_id":"AVG-2779","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2779"},{"reference_url":"https://security.archlinux.org/AVG-2780","reference_id":"AVG-2780","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2780"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T19:09:48Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T19:09:48Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5522-1/","reference_id":"USN-5522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5522-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-22677"],"risk_score":1.5,"exploitability":"0.5","weighted_severity":"3.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6dgz-w5ga-abb5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62519?format=json","vulnerability_id":"VCID-6tnz-34ve-ckds","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22628.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22628.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22628","reference_id":"","reference_type":"","scores":[{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43438","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43647","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43636","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43571","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43502","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43507","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43424","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43294","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43369","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43387","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43325","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43356","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43418","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43596","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43622","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43559","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.4361","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43615","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43633","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43602","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00211","scoring_system":"epss","scoring_elements":"0.43586","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073896","reference_id":"2073896","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073896"},{"reference_url":"https://security.archlinux.org/AVG-2703","reference_id":"AVG-2703","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2703"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213182","reference_id":"HT213182","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/"}],"url":"https://support.apple.com/en-us/HT213182"},{"reference_url":"https://support.apple.com/en-us/HT213186","reference_id":"HT213186","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/"}],"url":"https://support.apple.com/en-us/HT213186"},{"reference_url":"https://support.apple.com/en-us/HT213187","reference_id":"HT213187","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/"}],"url":"https://support.apple.com/en-us/HT213187"},{"reference_url":"https://support.apple.com/en-us/HT213193","reference_id":"HT213193","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/"}],"url":"https://support.apple.com/en-us/HT213193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5394-1/","reference_id":"USN-5394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-22628"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-6tnz-34ve-ckds"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62531?format=json","vulnerability_id":"VCID-789z-cprg-yqay","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32784","reference_id":"","reference_type":"","scores":[{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40147","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40136","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40484","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.4051","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40432","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40483","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40494","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40515","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40478","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40458","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40506","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40475","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40398","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40288","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40276","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40196","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40057","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40125","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40142","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40045","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00187","scoring_system":"epss","scoring_elements":"0.40069","published_at":"2026-05-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32784"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213341","reference_id":"HT213341","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T16:23:39Z/"}],"url":"https://support.apple.com/en-us/HT213341"},{"reference_url":"https://support.apple.com/en-us/HT213346","reference_id":"HT213346","reference_type":"","scores":[{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T16:23:39Z/"}],"url":"https://support.apple.com/en-us/HT213346"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-32784"],"risk_score":null,"exploitability":null,"weighted_severity":null,"resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-789z-cprg-yqay"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62529?format=json","vulnerability_id":"VCID-8kh9-phq4-13a3","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30293.json","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30293.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-30293","reference_id":"","reference_type":"","scores":[{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40065","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.39965","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.39988","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40053","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40378","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40329","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.4038","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40391","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40402","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40364","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40345","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40361","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40285","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40207","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40194","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40113","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.39975","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40044","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00186","scoring_system":"epss","scoring_elements":"0.40059","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-30293"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082548","reference_id":"2082548","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082548"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-30293"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8kh9-phq4-13a3"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62523?format=json","vulnerability_id":"VCID-8trg-392k-3bdh","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26700.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26700.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26700","reference_id":"","reference_type":"","scores":[{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32887","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33108","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33149","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33126","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33088","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3294","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32924","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3285","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3274","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32808","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32849","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32757","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.32782","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3286","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33228","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.3326","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33092","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33136","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33168","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33171","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00134","scoring_system":"epss","scoring_elements":"0.33132","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092732","reference_id":"2092732","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092732"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://support.apple.com/en-us/HT213260","reference_id":"HT213260","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/"}],"url":"https://support.apple.com/en-us/HT213260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5457-1/","reference_id":"USN-5457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5457-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-26700"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-8trg-392k-3bdh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62520?format=json","vulnerability_id":"VCID-apee-zyq1-9fdz","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22629.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22629.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22629","reference_id":"","reference_type":"","scores":[{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95807","published_at":"2026-05-15T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95739","published_at":"2026-04-09T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95743","published_at":"2026-04-11T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95742","published_at":"2026-04-12T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95744","published_at":"2026-04-13T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95753","published_at":"2026-04-16T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95757","published_at":"2026-04-18T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95759","published_at":"2026-04-29T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95761","published_at":"2026-04-26T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95773","published_at":"2026-05-05T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95775","published_at":"2026-05-07T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95781","published_at":"2026-05-09T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95787","published_at":"2026-05-11T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95792","published_at":"2026-05-12T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95805","published_at":"2026-05-14T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95716","published_at":"2026-04-02T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95723","published_at":"2026-04-04T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95726","published_at":"2026-04-07T12:55:00Z"},{"value":"0.21722","scoring_system":"epss","scoring_elements":"0.95735","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073899","reference_id":"2073899","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073899"},{"reference_url":"https://security.archlinux.org/AVG-2703","reference_id":"AVG-2703","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2703"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213182","reference_id":"HT213182","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/"}],"url":"https://support.apple.com/en-us/HT213182"},{"reference_url":"https://support.apple.com/en-us/HT213186","reference_id":"HT213186","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/"}],"url":"https://support.apple.com/en-us/HT213186"},{"reference_url":"https://support.apple.com/en-us/HT213187","reference_id":"HT213187","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/"}],"url":"https://support.apple.com/en-us/HT213187"},{"reference_url":"https://support.apple.com/en-us/HT213188","reference_id":"HT213188","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/"}],"url":"https://support.apple.com/en-us/HT213188"},{"reference_url":"https://support.apple.com/en-us/HT213193","reference_id":"HT213193","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/"}],"url":"https://support.apple.com/en-us/HT213193"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5394-1/","reference_id":"USN-5394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-22629"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-apee-zyq1-9fdz"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62525?format=json","vulnerability_id":"VCID-b83q-gs49-1yar","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26710.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26710.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26710","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40734","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40726","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40677","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40727","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46955","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46844","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47011","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46944","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46907","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46901","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46882","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46819","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46876","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46945","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46962","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46979","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46952","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.46959","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00239","scoring_system":"epss","scoring_elements":"0.47015","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26710"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104789","reference_id":"2104789","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104789"},{"reference_url":"https://security.archlinux.org/AVG-2779","reference_id":"AVG-2779","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2779"},{"reference_url":"https://security.archlinux.org/AVG-2780","reference_id":"AVG-2780","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2780"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5522-1/","reference_id":"USN-5522-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5522-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-26710"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-b83q-gs49-1yar"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62527?format=json","vulnerability_id":"VCID-bk7s-xwkc-67c4","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26717.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26717.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26717","reference_id":"","reference_type":"","scores":[{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73487","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73492","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73515","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73523","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00771","scoring_system":"epss","scoring_elements":"0.73537","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76676","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76786","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76704","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76684","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76717","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76798","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.7678","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76761","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76749","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76743","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76711","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76722","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76802","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.7685","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00974","scoring_system":"epss","scoring_elements":"0.76864","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092735","reference_id":"2092735","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092735"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://support.apple.com/en-us/HT213259","reference_id":"HT213259","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213259"},{"reference_url":"https://support.apple.com/en-us/HT213260","reference_id":"HT213260","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/"}],"url":"https://support.apple.com/en-us/HT213260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5457-1/","reference_id":"USN-5457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5457-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-26717"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-bk7s-xwkc-67c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62530?format=json","vulnerability_id":"VCID-eydj-6sth-akgw","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30294.json","reference_id":"","reference_type":"","scores":[],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30294.json"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082544","reference_id":"2082544","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2082544"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-30294"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-eydj-6sth-akgw"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62521?format=json","vulnerability_id":"VCID-fpag-gk3v-bfhq","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22662.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22662.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22662","reference_id":"","reference_type":"","scores":[{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44846","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44724","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44753","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44825","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44941","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44962","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44903","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44955","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44956","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44977","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44945","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44948","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44999","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44993","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44943","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44852","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.4486","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44804","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44697","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44767","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00223","scoring_system":"epss","scoring_elements":"0.44782","published_at":"2026-05-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22662"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104787","reference_id":"2104787","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2104787"},{"reference_url":"https://security.archlinux.org/AVG-2779","reference_id":"AVG-2779","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2779"},{"reference_url":"https://security.archlinux.org/AVG-2780","reference_id":"AVG-2780","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2780"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-22662"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-fpag-gk3v-bfhq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62526?format=json","vulnerability_id":"VCID-gaxq-59p5-fufx","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26716.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26716.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26716","reference_id":"","reference_type":"","scores":[{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34038","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34104","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34135","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.33995","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00139","scoring_system":"epss","scoring_elements":"0.34069","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39028","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38589","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39147","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39117","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3882","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38675","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38663","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.3859","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38714","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38797","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38612","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38687","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38693","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39149","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39111","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.39092","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092734","reference_id":"2092734","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092734"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://support.apple.com/en-us/HT213260","reference_id":"HT213260","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/"}],"url":"https://support.apple.com/en-us/HT213260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5457-1/","reference_id":"USN-5457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5457-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-26716"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gaxq-59p5-fufx"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62514?format=json","vulnerability_id":"VCID-hshv-d587-73b9","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22589.json","reference_id":"","reference_type":"","scores":[{"value":"7.6","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22589.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22589","reference_id":"","reference_type":"","scores":[{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73803","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73827","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73797","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73832","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73844","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73867","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73848","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.7384","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73882","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.7389","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73916","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73925","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.7392","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73947","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.7397","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73933","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.73956","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.74013","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00788","scoring_system":"epss","scoring_elements":"0.74018","published_at":"2026-05-15T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053179","reference_id":"2053179","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053179"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5306-1/","reference_id":"USN-5306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5306-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-22589"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-hshv-d587-73b9"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/42031?format=json","vulnerability_id":"VCID-m329-nde9-xyc5","summary":"Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution.","references":[{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2294","reference_id":"","reference_type":"","scores":[{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76956","published_at":"2026-05-05T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.77003","published_at":"2026-05-09T12:55:00Z"},{"value":"0.0099","scoring_system":"epss","scoring_elements":"0.76986","published_at":"2026-05-07T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78678","published_at":"2026-04-24T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78647","published_at":"2026-04-21T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78651","published_at":"2026-04-18T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78653","published_at":"2026-04-16T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78624","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78632","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.7865","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78625","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78594","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78619","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78703","published_at":"2026-04-29T12:55:00Z"},{"value":"0.01165","scoring_system":"epss","scoring_elements":"0.78686","published_at":"2026-04-26T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79624","published_at":"2026-05-15T12:55:00Z"},{"value":"0.01262","scoring_system":"epss","scoring_elements":"0.79619","published_at":"2026-05-14T12:55:00Z"},{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.81168","published_at":"2026-05-12T12:55:00Z"},{"value":"0.01485","scoring_system":"epss","scoring_elements":"0.8115","published_at":"2026-05-11T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81252","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01526","scoring_system":"epss","scoring_elements":"0.81229","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-2294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2294","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2294"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2295","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2295"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2296","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2296"},{"reference_url":"https://crbug.com/1341043","reference_id":"1341043","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-12T15:04:35Z/"}],"url":"https://crbug.com/1341043"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/07/28/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-12T15:04:35Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/07/28/2"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5BQRTR4SIUNIHLLPWTGYSDNQK7DYCRSB/","reference_id":"5BQRTR4SIUNIHLLPWTGYSDNQK7DYCRSB","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-12T15:04:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5BQRTR4SIUNIHLLPWTGYSDNQK7DYCRSB/"},{"reference_url":"https://security.gentoo.org/glsa/202208-35","reference_id":"GLSA-202208-35","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-12T15:04:35Z/"}],"url":"https://security.gentoo.org/glsa/202208-35"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-12T15:04:35Z/"}],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://security.gentoo.org/glsa/202311-11","reference_id":"GLSA-202311-11","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-12T15:04:35Z/"}],"url":"https://security.gentoo.org/glsa/202311-11"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H2C4XOJVIILDXTOSMWJXHSQNEXFWSOD7/","reference_id":"H2C4XOJVIILDXTOSMWJXHSQNEXFWSOD7","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-12T15:04:35Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H2C4XOJVIILDXTOSMWJXHSQNEXFWSOD7/"},{"reference_url":"https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop.html","reference_id":"stable-channel-update-for-desktop.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-12T15:04:35Z/"}],"url":"https://chromereleases.googleblog.com/2022/07/stable-channel-update-for-desktop.html"},{"reference_url":"https://usn.ubuntu.com/5568-1/","reference_id":"USN-5568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5568-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-2294"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-m329-nde9-xyc5"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62524?format=json","vulnerability_id":"VCID-qtt7-5r89-tbg7","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26709.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26709.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26709","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36736","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36818","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3685","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36686","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36753","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39747","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39855","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39771","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39842","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39831","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39811","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.39746","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42114","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.41971","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42053","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42158","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42209","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42059","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42221","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00201","scoring_system":"epss","scoring_elements":"0.42184","published_at":"2026-04-18T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092733","reference_id":"2092733","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092733"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://support.apple.com/en-us/HT213260","reference_id":"HT213260","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/"}],"url":"https://support.apple.com/en-us/HT213260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5457-1/","reference_id":"USN-5457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5457-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-26709"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qtt7-5r89-tbg7"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62515?format=json","vulnerability_id":"VCID-r24t-dva3-kub8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22590.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22590.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22590","reference_id":"","reference_type":"","scores":[{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60853","published_at":"2026-05-15T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60689","published_at":"2026-05-05T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60735","published_at":"2026-05-07T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60792","published_at":"2026-05-09T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.60753","published_at":"2026-05-11T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.6078","published_at":"2026-05-12T12:55:00Z"},{"value":"0.004","scoring_system":"epss","scoring_elements":"0.6084","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60772","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60814","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.6082","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60793","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60807","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60799","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60805","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60724","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60754","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60719","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60768","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00401","scoring_system":"epss","scoring_elements":"0.60783","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053181","reference_id":"2053181","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053181"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5306-1/","reference_id":"USN-5306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5306-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-22590"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-r24t-dva3-kub8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62533?format=json","vulnerability_id":"VCID-rquw-cmsc-tka8","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32893.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32893.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32893","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25022","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25057","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37338","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37313","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37232","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37242","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37208","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37182","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37228","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36929","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37217","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37166","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36897","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.37154","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.3673","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36707","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.3721","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36783","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36759","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36692","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00163","scoring_system":"epss","scoring_elements":"0.36809","published_at":"2026-04-29T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32893"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32893","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32893"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/08/29/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/08/29/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/09/13/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/09/13/1"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/09/02/10","reference_id":"10","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/09/02/10"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Aug/16","reference_id":"16","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Aug/16"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/08/26/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/08/26/2"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/08/29/2","reference_id":"2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/08/29/2"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2121645","reference_id":"2121645","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2121645"},{"reference_url":"http://seclists.org/fulldisclosure/2022/Oct/49","reference_id":"49","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://seclists.org/fulldisclosure/2022/Oct/49"},{"reference_url":"http://www.openwall.com/lists/oss-security/2022/08/25/5","reference_id":"5","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"http://www.openwall.com/lists/oss-security/2022/08/25/5"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/","reference_id":"7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/"},{"reference_url":"https://security.archlinux.org/AVG-2819","reference_id":"AVG-2819","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2819"},{"reference_url":"https://security.archlinux.org/AVG-2820","reference_id":"AVG-2820","reference_type":"","scores":[{"value":"Unknown","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2820"},{"reference_url":"https://www.debian.org/security/2022/dsa-5219","reference_id":"dsa-5219","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5219"},{"reference_url":"https://www.debian.org/security/2022/dsa-5220","reference_id":"dsa-5220","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://www.debian.org/security/2022/dsa-5220"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213412","reference_id":"HT213412","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://support.apple.com/en-us/HT213412"},{"reference_url":"https://support.apple.com/en-us/HT213413","reference_id":"HT213413","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://support.apple.com/en-us/HT213413"},{"reference_url":"https://support.apple.com/en-us/HT213414","reference_id":"HT213414","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://support.apple.com/en-us/HT213414"},{"reference_url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html","reference_id":"msg00019.html","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6540","reference_id":"RHSA-2022:6540","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6540"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:6634","reference_id":"RHSA-2022:6634","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:6634"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5611-1/","reference_id":"USN-5611-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5611-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/","reference_id":"YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-32893"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rquw-cmsc-tka8"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62532?format=json","vulnerability_id":"VCID-s239-gjv2-qqdg","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32792.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32792.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32792","reference_id":"","reference_type":"","scores":[{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52711","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52719","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52746","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52762","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52757","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52807","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52791","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52775","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52812","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52819","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52802","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52751","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52723","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00295","scoring_system":"epss","scoring_elements":"0.52667","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53613","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53491","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53544","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53506","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53532","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00302","scoring_system":"epss","scoring_elements":"0.53603","published_at":"2026-05-14T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238973","reference_id":"2238973","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238973"},{"reference_url":"https://security.archlinux.org/AVG-2789","reference_id":"AVG-2789","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2789"},{"reference_url":"https://security.archlinux.org/AVG-2790","reference_id":"AVG-2790","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2790"},{"reference_url":"https://security.archlinux.org/AVG-2791","reference_id":"AVG-2791","reference_type":"","scores":[{"value":"Critical","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2791"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213340","reference_id":"HT213340","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/"}],"url":"https://support.apple.com/en-us/HT213340"},{"reference_url":"https://support.apple.com/en-us/HT213341","reference_id":"HT213341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/"}],"url":"https://support.apple.com/en-us/HT213341"},{"reference_url":"https://support.apple.com/en-us/HT213342","reference_id":"HT213342","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/"}],"url":"https://support.apple.com/en-us/HT213342"},{"reference_url":"https://support.apple.com/en-us/HT213346","reference_id":"HT213346","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/"}],"url":"https://support.apple.com/en-us/HT213346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5568-1/","reference_id":"USN-5568-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5568-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-32792"],"risk_score":4.5,"exploitability":"0.5","weighted_severity":"9.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-s239-gjv2-qqdg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62518?format=json","vulnerability_id":"VCID-t6ad-d451-k3cy","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22624.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22624.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22624","reference_id":"","reference_type":"","scores":[{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.64081","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63947","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63938","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63955","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63967","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63966","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63982","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.64028","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63995","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.64021","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.64072","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63884","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63911","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63868","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63919","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63936","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63935","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63902","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00456","scoring_system":"epss","scoring_elements":"0.63937","published_at":"2026-04-16T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073893","reference_id":"2073893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2073893"},{"reference_url":"https://security.archlinux.org/AVG-2703","reference_id":"AVG-2703","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2703"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213182","reference_id":"HT213182","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:07:51Z/"}],"url":"https://support.apple.com/en-us/HT213182"},{"reference_url":"https://support.apple.com/en-us/HT213186","reference_id":"HT213186","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:07:51Z/"}],"url":"https://support.apple.com/en-us/HT213186"},{"reference_url":"https://support.apple.com/en-us/HT213187","reference_id":"HT213187","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:07:51Z/"}],"url":"https://support.apple.com/en-us/HT213187"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5394-1/","reference_id":"USN-5394-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5394-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-22624"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-t6ad-d451-k3cy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62528?format=json","vulnerability_id":"VCID-w98c-tpu4-ufa2","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26719.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26719.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26719","reference_id":"","reference_type":"","scores":[{"value":"0.00176","scoring_system":"epss","scoring_elements":"0.38693","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50961","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50923","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50949","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50906","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00275","scoring_system":"epss","scoring_elements":"0.50963","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57311","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57267","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57318","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57337","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57315","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.5738","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57359","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57415","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57349","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57324","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57374","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57385","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57399","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57379","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092736","reference_id":"2092736","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2092736"},{"reference_url":"https://security.archlinux.org/AVG-2758","reference_id":"AVG-2758","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2758"},{"reference_url":"https://security.archlinux.org/AVG-2759","reference_id":"AVG-2759","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2759"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://support.apple.com/en-us/HT213253","reference_id":"HT213253","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/"}],"url":"https://support.apple.com/en-us/HT213253"},{"reference_url":"https://support.apple.com/en-us/HT213254","reference_id":"HT213254","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/"}],"url":"https://support.apple.com/en-us/HT213254"},{"reference_url":"https://support.apple.com/en-us/HT213257","reference_id":"HT213257","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/"}],"url":"https://support.apple.com/en-us/HT213257"},{"reference_url":"https://support.apple.com/en-us/HT213258","reference_id":"HT213258","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/"}],"url":"https://support.apple.com/en-us/HT213258"},{"reference_url":"https://support.apple.com/en-us/HT213260","reference_id":"HT213260","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/"}],"url":"https://support.apple.com/en-us/HT213260"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:7704","reference_id":"RHSA-2022:7704","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:7704"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:8054","reference_id":"RHSA-2022:8054","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:8054"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5457-1/","reference_id":"USN-5457-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5457-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-26719"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-w98c-tpu4-ufa2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/62516?format=json","vulnerability_id":"VCID-wht8-k729-nyh9","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22592.json","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22592.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22592","reference_id":"","reference_type":"","scores":[{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38897","published_at":"2026-05-15T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38796","published_at":"2026-05-05T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38868","published_at":"2026-05-07T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38885","published_at":"2026-05-09T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38795","published_at":"2026-05-11T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.38817","published_at":"2026-05-12T12:55:00Z"},{"value":"0.00177","scoring_system":"epss","scoring_elements":"0.3889","published_at":"2026-05-14T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39415","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39357","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3941","published_at":"2026-04-16T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39381","published_at":"2026-04-18T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39294","published_at":"2026-04-21T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39098","published_at":"2026-04-24T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.3908","published_at":"2026-04-26T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.38999","published_at":"2026-04-29T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39376","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39394","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39417","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39332","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39387","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00178","scoring_system":"epss","scoring_elements":"0.39404","published_at":"2026-04-09T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-22592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053185","reference_id":"2053185","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2053185"},{"reference_url":"https://security.gentoo.org/glsa/202208-39","reference_id":"GLSA-202208-39","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202208-39"},{"reference_url":"https://access.redhat.com/errata/RHSA-2022:1777","reference_id":"RHSA-2022:1777","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2022:1777"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/5306-1/","reference_id":"USN-5306-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/5306-1/"}],"fixed_packages":[{"url":"http://public2.vulnerablecode.io/api/packages/85886?format=json","purl":"pkg:ebuild/net-libs/webkit-gtk@2.36.7","is_vulnerable":false,"affected_by_vulnerabilities":[],"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}],"aliases":["CVE-2022-22592"],"risk_score":3.6,"exploitability":"0.5","weighted_severity":"7.3","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-wht8-k729-nyh9"}],"risk_score":null,"resource_url":"http://public2.vulnerablecode.io/packages/pkg:ebuild/net-libs/webkit-gtk@2.36.7"}