{"url":"http://public2.vulnerablecode.io/api/packages/86879?format=json","purl":"pkg:rpm/redhat/webkit2gtk3@2.46.3-1?arch=el8_6","type":"rpm","namespace":"redhat","name":"webkit2gtk3","version":"2.46.3-1","qualifiers":{"arch":"el8_6"},"subpath":"","is_vulnerable":true,"next_non_vulnerable_version":null,"latest_non_vulnerable_version":null,"affected_by_vulnerabilities":[{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74669?format=json","vulnerability_id":"VCID-1164-uckc-qfbs","summary":"webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40789","reference_id":"","reference_type":"","scores":[{"value":"0.00696","scoring_system":"epss","scoring_elements":"0.71921","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00754","scoring_system":"epss","scoring_elements":"0.73176","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73263","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73214","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73241","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.7325","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73269","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00756","scoring_system":"epss","scoring_elements":"0.73289","published_at":"2026-04-11T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40789"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302067","reference_id":"2302067","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302067"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/kb/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/kb/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40789"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1164-uckc-qfbs"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73819?format=json","vulnerability_id":"VCID-1e6d-p4fv-rubk","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27808","reference_id":"","reference_type":"","scores":[{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.7442","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74404","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74379","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74411","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74427","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74449","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00822","scoring_system":"epss","scoring_elements":"0.74429","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01092","scoring_system":"epss","scoring_elements":"0.77899","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314697","reference_id":"2314697","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314697"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27808"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6d-p4fv-rubk"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61836?format=json","vulnerability_id":"VCID-3daw-8nh6-dfcq","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json","reference_id":"","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44185","reference_id":"","reference_type":"","scores":[{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.1148","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11549","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11603","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11392","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11476","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11535","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11545","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00038","scoring_system":"epss","scoring_elements":"0.11511","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44185"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323263","reference_id":"2323263","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323263"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9637","reference_id":"RHSA-2024:9637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-44185"],"risk_score":2.5,"exploitability":"0.5","weighted_severity":"5.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-3daw-8nh6-dfcq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33726?format=json","vulnerability_id":"VCID-7ehr-3myw-g7b1","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42917","reference_id":"","reference_type":"","scores":[{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20853","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.2102","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20906","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20949","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20933","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20792","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.21076","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00068","scoring_system":"epss","scoring_elements":"0.20872","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42917"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/12/05/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/12/05/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/12","reference_id":"12","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/12"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/13","reference_id":"13","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/13"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253058","reference_id":"2253058","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2253058"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/3","reference_id":"3","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/3"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jan/35","reference_id":"35","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jan/35"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/4","reference_id":"4","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/4"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/5","reference_id":"5","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/5"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Dec/8","reference_id":"8","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Dec/8"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/","reference_id":"AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/"},{"reference_url":"https://www.debian.org/security/2023/dsa-5575","reference_id":"dsa-5575","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://www.debian.org/security/2023/dsa-5575"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://support.apple.com/en-us/HT214031","reference_id":"HT214031","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/en-us/HT214031"},{"reference_url":"https://support.apple.com/en-us/HT214032","reference_id":"HT214032","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/en-us/HT214032"},{"reference_url":"https://support.apple.com/en-us/HT214033","reference_id":"HT214033","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/en-us/HT214033"},{"reference_url":"https://support.apple.com/kb/HT214033","reference_id":"HT214033","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/kb/HT214033"},{"reference_url":"https://support.apple.com/kb/HT214034","reference_id":"HT214034","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/kb/HT214034"},{"reference_url":"https://support.apple.com/kb/HT214062","reference_id":"HT214062","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://support.apple.com/kb/HT214062"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/","reference_id":"P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7715","reference_id":"RHSA-2023:7715","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7715"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7716","reference_id":"RHSA-2023:7716","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7716"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6545-1/","reference_id":"USN-6545-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6545-1/"}],"fixed_packages":[],"aliases":["CVE-2023-42917"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-7ehr-3myw-g7b1"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66440?format=json","vulnerability_id":"VCID-933e-5azn-6yec","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43000.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43000.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43000","reference_id":"","reference_type":"","scores":[{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18715","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18949","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18673","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18753","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18807","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18812","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0006","scoring_system":"epss","scoring_elements":"0.18765","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00095","scoring_system":"epss","scoring_elements":"0.26483","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43000"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120324","reference_id":"120324","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/120324"},{"reference_url":"https://support.apple.com/en-us/120331","reference_id":"120331","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/120331"},{"reference_url":"https://support.apple.com/en-us/120338","reference_id":"120338","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/120338"},{"reference_url":"https://support.apple.com/en-us/126632","reference_id":"126632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/"}],"url":"https://support.apple.com/en-us/126632"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416324","reference_id":"2416324","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416324"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-43000"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-933e-5azn-6yec"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/66452?format=json","vulnerability_id":"VCID-9dnz-1f32-gfdp","summary":"webkitgtk: A malicious website may exfiltrate data cross-origin","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43480.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43480.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43480","reference_id":"","reference_type":"","scores":[{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08118","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08128","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08079","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.0814","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08162","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08154","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00029","scoring_system":"epss","scoring_elements":"0.08135","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08458","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-43480"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/125632","reference_id":"125632","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125632"},{"reference_url":"https://support.apple.com/en-us/125634","reference_id":"125634","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125634"},{"reference_url":"https://support.apple.com/en-us/125637","reference_id":"125637","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125637"},{"reference_url":"https://support.apple.com/en-us/125638","reference_id":"125638","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125638"},{"reference_url":"https://support.apple.com/en-us/125639","reference_id":"125639","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125639"},{"reference_url":"https://support.apple.com/en-us/125640","reference_id":"125640","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/"}],"url":"https://support.apple.com/en-us/125640"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416338","reference_id":"2416338","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2416338"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2025-43480"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-9dnz-1f32-gfdp"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69654?format=json","vulnerability_id":"VCID-c4np-b4zq-tkch","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31204","reference_id":"","reference_type":"","scores":[{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71229","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71188","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71206","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71181","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71223","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71237","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.7126","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00666","scoring_system":"epss","scoring_elements":"0.71245","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31204"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366500","reference_id":"2366500","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366500"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[],"aliases":["CVE-2025-31204"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c4np-b4zq-tkch"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69657?format=json","vulnerability_id":"VCID-c9mb-24v2-q3ba","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31215","reference_id":"","reference_type":"","scores":[{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78251","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78203","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78233","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78215","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78242","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78247","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78272","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01121","scoring_system":"epss","scoring_elements":"0.78256","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31215"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366503","reference_id":"2366503","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366503"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[],"aliases":["CVE-2025-31215"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mb-24v2-q3ba"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72076?format=json","vulnerability_id":"VCID-ceyb-j3sq-27fh","summary":"webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27856.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27856.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27856","reference_id":"","reference_type":"","scores":[{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07092","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.06996","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07049","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07029","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07084","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07114","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00025","scoring_system":"epss","scoring_elements":"0.07103","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27856"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344618","reference_id":"2344618","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2344618"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27856"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ceyb-j3sq-27fh"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69652?format=json","vulnerability_id":"VCID-drtd-1c4r-1bbf","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42970.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42970.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42970","reference_id":"","reference_type":"","scores":[{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64453","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64424","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64455","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64414","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64462","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64478","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64494","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00467","scoring_system":"epss","scoring_elements":"0.64481","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120330","reference_id":"120330","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120330"},{"reference_url":"https://support.apple.com/en-us/120947","reference_id":"120947","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120947"},{"reference_url":"https://support.apple.com/en-us/120948","reference_id":"120948","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120948"},{"reference_url":"https://support.apple.com/en-us/120949","reference_id":"120949","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120949"},{"reference_url":"https://support.apple.com/en-us/120950","reference_id":"120950","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/"}],"url":"https://support.apple.com/en-us/120950"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366498","reference_id":"2366498","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366498"},{"reference_url":"https://security.archlinux.org/ASA-202505-2","reference_id":"ASA-202505-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-2"},{"reference_url":"https://security.archlinux.org/ASA-202505-3","reference_id":"ASA-202505-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-3"},{"reference_url":"https://security.archlinux.org/ASA-202505-4","reference_id":"ASA-202505-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-4"},{"reference_url":"https://security.archlinux.org/ASA-202505-5","reference_id":"ASA-202505-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-5"},{"reference_url":"https://security.archlinux.org/AVG-2867","reference_id":"AVG-2867","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2867"},{"reference_url":"https://security.archlinux.org/AVG-2868","reference_id":"AVG-2868","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2868"},{"reference_url":"https://security.archlinux.org/AVG-2869","reference_id":"AVG-2869","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2869"},{"reference_url":"https://security.archlinux.org/AVG-2870","reference_id":"AVG-2870","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-42970"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-drtd-1c4r-1bbf"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73822?format=json","vulnerability_id":"VCID-dxsm-nf4f-yfe4","summary":"webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27833","reference_id":"","reference_type":"","scores":[{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79105","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79087","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79072","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79097","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79104","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79128","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01223","scoring_system":"epss","scoring_elements":"0.79115","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01652","scoring_system":"epss","scoring_elements":"0.81967","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314700","reference_id":"2314700","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314700"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214100","reference_id":"HT214100","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214100"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27833"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-dxsm-nf4f-yfe4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69656?format=json","vulnerability_id":"VCID-ey9n-zksh-mbfm","summary":"webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31206","reference_id":"","reference_type":"","scores":[{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78151","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78103","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78133","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78116","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78142","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78148","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78173","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01111","scoring_system":"epss","scoring_elements":"0.78155","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-31206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122405","reference_id":"122405","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122405"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366502","reference_id":"2366502","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366502"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[],"aliases":["CVE-2025-31206"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ey9n-zksh-mbfm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/64203?format=json","vulnerability_id":"VCID-gn1n-fjzp-hqe2","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43010","reference_id":"","reference_type":"","scores":[{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.1427","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14354","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14309","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14362","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14308","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14418","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00046","scoring_system":"epss","scoring_elements":"0.14225","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0005","scoring_system":"epss","scoring_elements":"0.15601","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120300","reference_id":"120300","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/120300"},{"reference_url":"https://support.apple.com/en-us/120877","reference_id":"120877","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/120877"},{"reference_url":"https://support.apple.com/en-us/120879","reference_id":"120879","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/120879"},{"reference_url":"https://support.apple.com/en-us/126632","reference_id":"126632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/126632"},{"reference_url":"https://support.apple.com/en-us/126646","reference_id":"126646","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/"}],"url":"https://support.apple.com/en-us/126646"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448778","reference_id":"2448778","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2448778"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-43010"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-gn1n-fjzp-hqe2"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69653?format=json","vulnerability_id":"VCID-kdvu-rhgt-xqat","summary":"webkitgtk: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24223","reference_id":"","reference_type":"","scores":[{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45855","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45831","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45853","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45803","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45859","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45856","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45878","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0023","scoring_system":"epss","scoring_elements":"0.45848","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24223"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122404","reference_id":"122404","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122404"},{"reference_url":"https://support.apple.com/en-us/122716","reference_id":"122716","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122716"},{"reference_url":"https://support.apple.com/en-us/122719","reference_id":"122719","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122719"},{"reference_url":"https://support.apple.com/en-us/122720","reference_id":"122720","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122720"},{"reference_url":"https://support.apple.com/en-us/122721","reference_id":"122721","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122721"},{"reference_url":"https://support.apple.com/en-us/122722","reference_id":"122722","reference_type":"","scores":[{"value":"8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/"}],"url":"https://support.apple.com/en-us/122722"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366499","reference_id":"2366499","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366499"},{"reference_url":"https://security.archlinux.org/AVG-2863","reference_id":"AVG-2863","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2863"},{"reference_url":"https://security.archlinux.org/AVG-2864","reference_id":"AVG-2864","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2864"},{"reference_url":"https://security.archlinux.org/AVG-2865","reference_id":"AVG-2865","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2865"},{"reference_url":"https://security.archlinux.org/AVG-2866","reference_id":"AVG-2866","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2866"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7566-1/","reference_id":"USN-7566-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7566-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24223"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kdvu-rhgt-xqat"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/78307?format=json","vulnerability_id":"VCID-knds-dwjv-c3c4","summary":"webkitgtk: improper bounds checking leading to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48503.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48503.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48503","reference_id":"","reference_type":"","scores":[{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.3691","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00159","scoring_system":"epss","scoring_elements":"0.36879","published_at":"2026-04-02T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39622","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39674","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0018","scoring_system":"epss","scoring_elements":"0.39639","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40327","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40265","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00185","scoring_system":"epss","scoring_elements":"0.40316","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218623","reference_id":"2218623","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2218623"},{"reference_url":"https://support.apple.com/en-us/HT213340","reference_id":"HT213340","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"}],"url":"https://support.apple.com/en-us/HT213340"},{"reference_url":"https://support.apple.com/en-us/HT213341","reference_id":"HT213341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"}],"url":"https://support.apple.com/en-us/HT213341"},{"reference_url":"https://support.apple.com/en-us/HT213342","reference_id":"HT213342","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"}],"url":"https://support.apple.com/en-us/HT213342"},{"reference_url":"https://support.apple.com/en-us/HT213346","reference_id":"HT213346","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/"}],"url":"https://support.apple.com/en-us/HT213346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2256","reference_id":"RHSA-2023:2256","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2256"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:2834","reference_id":"RHSA-2023:2834","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:2834"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2022-48503"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-knds-dwjv-c3c4"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74539?format=json","vulnerability_id":"VCID-kp4m-h6ua-h7dm","summary":"webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40776","reference_id":"","reference_type":"","scores":[{"value":"0.00348","scoring_system":"epss","scoring_elements":"0.57349","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59363","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59344","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5933","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59316","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.5928","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00378","scoring_system":"epss","scoring_elements":"0.59346","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00441","scoring_system":"epss","scoring_elements":"0.63204","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40776"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.1","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301841","reference_id":"2301841","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2301841"},{"reference_url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/","reference_id":"apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40776"],"risk_score":2.6,"exploitability":"0.5","weighted_severity":"5.2","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-kp4m-h6ua-h7dm"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/69651?format=json","vulnerability_id":"VCID-mvm2-2uz9-bufg","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42875.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42875.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42875","reference_id":"","reference_type":"","scores":[{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52351","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52292","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52319","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52282","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52335","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5233","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.5238","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00289","scoring_system":"epss","scoring_elements":"0.52365","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120330","reference_id":"120330","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120330"},{"reference_url":"https://support.apple.com/en-us/120947","reference_id":"120947","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120947"},{"reference_url":"https://support.apple.com/en-us/120948","reference_id":"120948","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120948"},{"reference_url":"https://support.apple.com/en-us/120949","reference_id":"120949","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120949"},{"reference_url":"https://support.apple.com/en-us/120950","reference_id":"120950","reference_type":"","scores":[{"value":"7.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/"}],"url":"https://support.apple.com/en-us/120950"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366497","reference_id":"2366497","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2366497"},{"reference_url":"https://security.archlinux.org/ASA-202505-2","reference_id":"ASA-202505-2","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-2"},{"reference_url":"https://security.archlinux.org/ASA-202505-3","reference_id":"ASA-202505-3","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-3"},{"reference_url":"https://security.archlinux.org/ASA-202505-4","reference_id":"ASA-202505-4","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-4"},{"reference_url":"https://security.archlinux.org/ASA-202505-5","reference_id":"ASA-202505-5","reference_type":"","scores":[],"url":"https://security.archlinux.org/ASA-202505-5"},{"reference_url":"https://security.archlinux.org/AVG-2867","reference_id":"AVG-2867","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2867"},{"reference_url":"https://security.archlinux.org/AVG-2868","reference_id":"AVG-2868","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2868"},{"reference_url":"https://security.archlinux.org/AVG-2869","reference_id":"AVG-2869","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2869"},{"reference_url":"https://security.archlinux.org/AVG-2870","reference_id":"AVG-2870","reference_type":"","scores":[{"value":"High","scoring_system":"archlinux","scoring_elements":""}],"url":"https://security.archlinux.org/AVG-2870"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-42875"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"8.0","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-mvm2-2uz9-bufg"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61839?format=json","vulnerability_id":"VCID-n7w5-dz8n-mbht","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json","reference_id":"","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44244","reference_id":"","reference_type":"","scores":[{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51323","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51277","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51302","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51262","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51317","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51357","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00279","scoring_system":"epss","scoring_elements":"0.51336","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-44244"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121563","reference_id":"121563","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121563"},{"reference_url":"https://support.apple.com/en-us/121564","reference_id":"121564","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121564"},{"reference_url":"https://support.apple.com/en-us/121565","reference_id":"121565","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121565"},{"reference_url":"https://support.apple.com/en-us/121566","reference_id":"121566","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121566"},{"reference_url":"https://support.apple.com/en-us/121569","reference_id":"121569","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121569"},{"reference_url":"https://support.apple.com/en-us/121571","reference_id":"121571","reference_type":"","scores":[{"value":"4.3","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/"}],"url":"https://support.apple.com/en-us/121571"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323278","reference_id":"2323278","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2323278"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9545","reference_id":"RHSA-2024:9545","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9545"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9637","reference_id":"RHSA-2024:9637","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9637"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7113-1/","reference_id":"USN-7113-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7113-1/"}],"fixed_packages":[],"aliases":["CVE-2024-44244"],"risk_score":1.9,"exploitability":"0.5","weighted_severity":"3.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w5-dz8n-mbht"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73825?format=json","vulnerability_id":"VCID-pg5b-3vcj-7bav","summary":"webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27851","reference_id":"","reference_type":"","scores":[{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76783","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76758","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7674","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76771","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.76782","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7681","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00982","scoring_system":"epss","scoring_elements":"0.7679","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27851"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314704","reference_id":"2314704","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314704"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27851"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5b-3vcj-7bav"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74670?format=json","vulnerability_id":"VCID-q3jv-e392-5fef","summary":"webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40780","reference_id":"","reference_type":"","scores":[{"value":"0.00088","scoring_system":"epss","scoring_elements":"0.25195","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26649","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26644","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26594","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26741","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26526","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26604","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00096","scoring_system":"epss","scoring_elements":"0.26699","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40780"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302069","reference_id":"2302069","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302069"},{"reference_url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/","reference_id":"apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40780"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-q3jv-e392-5fef"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74672?format=json","vulnerability_id":"VCID-qvy2-8161-eycu","summary":"webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40782","reference_id":"","reference_type":"","scores":[{"value":"0.00389","scoring_system":"epss","scoring_elements":"0.6002","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62134","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62144","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62125","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62107","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62057","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00423","scoring_system":"epss","scoring_elements":"0.62088","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00445","scoring_system":"epss","scoring_elements":"0.63402","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40782"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302071","reference_id":"2302071","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302071"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40782"],"risk_score":3.9,"exploitability":"0.5","weighted_severity":"7.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-qvy2-8161-eycu"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/61850?format=json","vulnerability_id":"VCID-rj9q-8rw3-qbbn","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24264","reference_id":"","reference_type":"","scores":[{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80265","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.8031","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80274","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80302","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80313","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80331","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01384","scoring_system":"epss","scoring_elements":"0.80316","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2025-24264"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/122371","reference_id":"122371","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122371"},{"reference_url":"https://support.apple.com/en-us/122372","reference_id":"122372","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122372"},{"reference_url":"https://support.apple.com/en-us/122373","reference_id":"122373","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122373"},{"reference_url":"https://support.apple.com/en-us/122377","reference_id":"122377","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122377"},{"reference_url":"https://support.apple.com/en-us/122378","reference_id":"122378","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122378"},{"reference_url":"https://support.apple.com/en-us/122379","reference_id":"122379","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/"}],"url":"https://support.apple.com/en-us/122379"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357918","reference_id":"2357918","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2357918"},{"reference_url":"https://security.gentoo.org/glsa/202511-02","reference_id":"GLSA-202511-02","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202511-02"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/7436-1/","reference_id":"USN-7436-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/7436-1/"}],"fixed_packages":[],"aliases":["CVE-2025-24264"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9q-8rw3-qbbn"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/49511?format=json","vulnerability_id":"VCID-shfm-129h-47ha","summary":"Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32885","reference_id":"","reference_type":"","scores":[{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40756","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40731","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40784","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40708","published_at":"2026-04-07T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40758","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.40765","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00189","scoring_system":"epss","scoring_elements":"0.4075","published_at":"2026-04-12T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236842","reference_id":"2236842","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2236842"},{"reference_url":"https://security.gentoo.org/glsa/202305-32","reference_id":"GLSA-202305-32","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202305-32"},{"reference_url":"https://support.apple.com/en-us/HT213341","reference_id":"HT213341","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/"}],"url":"https://support.apple.com/en-us/HT213341"},{"reference_url":"https://support.apple.com/en-us/HT213346","reference_id":"HT213346","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/"}],"url":"https://support.apple.com/en-us/HT213346"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6061-1/","reference_id":"USN-6061-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6061-1/"}],"fixed_packages":[],"aliases":["CVE-2022-32885"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-shfm-129h-47ha"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47471?format=json","vulnerability_id":"VCID-u1sp-38g8-xfan","summary":"Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json","reference_id":"","reference_type":"","scores":[{"value":"7.0","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4558","reference_id":"","reference_type":"","scores":[{"value":"0.0238","scoring_system":"epss","scoring_elements":"0.84992","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85554","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85566","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85568","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85503","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85519","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85524","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02579","scoring_system":"epss","scoring_elements":"0.85544","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-4558"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689","reference_id":"2279689","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2279689"},{"reference_url":"https://issues.chromium.org/issues/337766133","reference_id":"337766133","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://issues.chromium.org/issues/337766133"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/","reference_id":"6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/","reference_id":"BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/","reference_id":"FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/"},{"reference_url":"https://security.gentoo.org/glsa/202412-05","reference_id":"GLSA-202412-05","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202412-05"},{"reference_url":"https://security.gentoo.org/glsa/202501-09","reference_id":"GLSA-202501-09","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202501-09"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/","reference_id":"IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/","reference_id":"LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9144","reference_id":"RHSA-2024:9144","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9144"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html","reference_id":"stable-channel-update-for-desktop_7.html","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/"}],"url":"https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-4558"],"risk_score":3.4,"exploitability":"0.5","weighted_severity":"6.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-u1sp-38g8-xfan"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/73820?format=json","vulnerability_id":"VCID-v1he-6exf-b7dt","summary":"webkitgtk: Processing web content may lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27820","reference_id":"","reference_type":"","scores":[{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79595","published_at":"2026-04-13T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79574","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79562","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.7959","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79597","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79618","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01283","scoring_system":"epss","scoring_elements":"0.79603","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01303","scoring_system":"epss","scoring_elements":"0.79704","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120896","reference_id":"120896","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120896"},{"reference_url":"https://support.apple.com/en-us/120898","reference_id":"120898","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120898"},{"reference_url":"https://support.apple.com/en-us/120901","reference_id":"120901","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120901"},{"reference_url":"https://support.apple.com/en-us/120902","reference_id":"120902","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120902"},{"reference_url":"https://support.apple.com/en-us/120903","reference_id":"120903","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120903"},{"reference_url":"https://support.apple.com/en-us/120905","reference_id":"120905","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120905"},{"reference_url":"https://support.apple.com/en-us/120906","reference_id":"120906","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/120906"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314698","reference_id":"2314698","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2314698"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jun/5","reference_id":"5","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jun/5"},{"reference_url":"https://support.apple.com/en-us/HT214100","reference_id":"HT214100","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214100"},{"reference_url":"https://support.apple.com/en-us/HT214101","reference_id":"HT214101","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214101"},{"reference_url":"https://support.apple.com/en-us/HT214102","reference_id":"HT214102","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214102"},{"reference_url":"https://support.apple.com/en-us/HT214103","reference_id":"HT214103","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214103"},{"reference_url":"https://support.apple.com/en-us/HT214104","reference_id":"HT214104","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214104"},{"reference_url":"https://support.apple.com/en-us/HT214106","reference_id":"HT214106","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214106"},{"reference_url":"https://support.apple.com/en-us/HT214108","reference_id":"HT214108","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/"}],"url":"https://support.apple.com/en-us/HT214108"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-27820"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-v1he-6exf-b7dt"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/47888?format=json","vulnerability_id":"VCID-x73g-k7yh-qydd","summary":"Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42852","reference_id":"","reference_type":"","scores":[{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84321","published_at":"2026-04-13T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84267","published_at":"2026-04-02T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84325","published_at":"2026-04-12T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84332","published_at":"2026-04-11T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84314","published_at":"2026-04-09T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84287","published_at":"2026-04-07T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84286","published_at":"2026-04-04T12:55:00Z"},{"value":"0.02171","scoring_system":"epss","scoring_elements":"0.84309","published_at":"2026-04-08T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-42852"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"http://www.openwall.com/lists/oss-security/2023/11/15/1","reference_id":"1","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://www.openwall.com/lists/oss-security/2023/11/15/1"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/19","reference_id":"19","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/19"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/22","reference_id":"22","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/22"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271456","reference_id":"2271456","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2271456"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/23","reference_id":"23","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/23"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/24","reference_id":"24","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/24"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/25","reference_id":"25","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/25"},{"reference_url":"http://seclists.org/fulldisclosure/2023/Oct/27","reference_id":"27","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"http://seclists.org/fulldisclosure/2023/Oct/27"},{"reference_url":"https://www.debian.org/security/2023/dsa-5557","reference_id":"dsa-5557","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://www.debian.org/security/2023/dsa-5557"},{"reference_url":"https://security.gentoo.org/glsa/202401-33","reference_id":"GLSA-202401-33","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://security.gentoo.org/glsa/202401-33"},{"reference_url":"https://support.apple.com/en-us/HT213981","reference_id":"HT213981","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213981"},{"reference_url":"https://support.apple.com/en-us/HT213982","reference_id":"HT213982","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213982"},{"reference_url":"https://support.apple.com/en-us/HT213984","reference_id":"HT213984","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213984"},{"reference_url":"https://support.apple.com/kb/HT213984","reference_id":"HT213984","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/kb/HT213984"},{"reference_url":"https://support.apple.com/en-us/HT213986","reference_id":"HT213986","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213986"},{"reference_url":"https://support.apple.com/en-us/HT213987","reference_id":"HT213987","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213987"},{"reference_url":"https://support.apple.com/en-us/HT213988","reference_id":"HT213988","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://support.apple.com/en-us/HT213988"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2126","reference_id":"RHSA-2024:2126","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2126"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:2982","reference_id":"RHSA-2024:2982","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:2982"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/","reference_id":"RPPMOWFYZODONTA3RLZOKSGNR4DELGG2","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/","reference_id":"S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/"},{"reference_url":"https://usn.ubuntu.com/6490-1/","reference_id":"USN-6490-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6490-1/"},{"reference_url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/","reference_id":"ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/"}],"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/"}],"fixed_packages":[],"aliases":["CVE-2023-42852"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-x73g-k7yh-qydd"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/33724?format=json","vulnerability_id":"VCID-xqyu-yhx3-f7fq","summary":"Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json","reference_id":"","reference_type":"","scores":[{"value":"9.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40397","reference_id":"","reference_type":"","scores":[{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78835","published_at":"2026-04-02T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78864","published_at":"2026-04-04T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78846","published_at":"2026-04-07T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78871","published_at":"2026-04-08T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78877","published_at":"2026-04-09T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78901","published_at":"2026-04-11T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78885","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01195","scoring_system":"epss","scoring_elements":"0.78875","published_at":"2026-04-13T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238945","reference_id":"2238945","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2238945"},{"reference_url":"https://security.gentoo.org/glsa/202401-04","reference_id":"GLSA-202401-04","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202401-04"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:6535","reference_id":"RHSA-2023:6535","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:6535"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:7055","reference_id":"RHSA-2023:7055","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:7055"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2023-40397"],"risk_score":4.4,"exploitability":"0.5","weighted_severity":"8.8","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-xqyu-yhx3-f7fq"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/72612?format=json","vulnerability_id":"VCID-y388-97uu-3qax","summary":"webkit: Processing maliciously crafted web content may lead to memory corruption","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54534.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54534.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54534","reference_id":"","reference_type":"","scores":[{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77728","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77702","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77685","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77713","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77719","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77745","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0107","scoring_system":"epss","scoring_elements":"0.77729","published_at":"2026-04-12T12:55:00Z"},{"value":"0.01113","scoring_system":"epss","scoring_elements":"0.78113","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-54534"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/121837","reference_id":"121837","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121837"},{"reference_url":"https://support.apple.com/en-us/121839","reference_id":"121839","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121839"},{"reference_url":"https://support.apple.com/en-us/121843","reference_id":"121843","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121843"},{"reference_url":"https://support.apple.com/en-us/121844","reference_id":"121844","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121844"},{"reference_url":"https://support.apple.com/en-us/121845","reference_id":"121845","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121845"},{"reference_url":"https://support.apple.com/en-us/121846","reference_id":"121846","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/"}],"url":"https://support.apple.com/en-us/121846"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333846","reference_id":"2333846","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2333846"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9553","reference_id":"RHSA-2024:9553","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9553"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"}],"fixed_packages":[],"aliases":["CVE-2024-54534"],"risk_score":4.0,"exploitability":"0.5","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y388-97uu-3qax"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/74671?format=json","vulnerability_id":"VCID-y77v-hwy6-hfhy","summary":"webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json","reference_id":"","reference_type":"","scores":[{"value":"6.5","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40779","reference_id":"","reference_type":"","scores":[{"value":"0.00028","scoring_system":"epss","scoring_elements":"0.07846","published_at":"2026-04-13T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08614","published_at":"2026-04-12T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08638","published_at":"2026-04-11T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.0864","published_at":"2026-04-09T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08616","published_at":"2026-04-08T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08543","published_at":"2026-04-07T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08625","published_at":"2026-04-04T12:55:00Z"},{"value":"0.0003","scoring_system":"epss","scoring_elements":"0.08573","published_at":"2026-04-02T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-40779"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/120908","reference_id":"120908","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120908"},{"reference_url":"https://support.apple.com/en-us/120909","reference_id":"120909","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120909"},{"reference_url":"https://support.apple.com/en-us/120911","reference_id":"120911","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120911"},{"reference_url":"https://support.apple.com/en-us/120913","reference_id":"120913","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120913"},{"reference_url":"https://support.apple.com/en-us/120914","reference_id":"120914","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120914"},{"reference_url":"https://support.apple.com/en-us/120915","reference_id":"120915","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120915"},{"reference_url":"https://support.apple.com/en-us/120916","reference_id":"120916","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/120916"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/15","reference_id":"15","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/15"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/16","reference_id":"16","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/16"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/17","reference_id":"17","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/17"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/18","reference_id":"18","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/18"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/21","reference_id":"21","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/21"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/22","reference_id":"22","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/22"},{"reference_url":"http://seclists.org/fulldisclosure/2024/Jul/23","reference_id":"23","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"http://seclists.org/fulldisclosure/2024/Jul/23"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302070","reference_id":"2302070","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2302070"},{"reference_url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/","reference_id":"apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/"},{"reference_url":"https://support.apple.com/en-us/HT214116","reference_id":"HT214116","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214116"},{"reference_url":"https://support.apple.com/en-us/HT214117","reference_id":"HT214117","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214117"},{"reference_url":"https://support.apple.com/en-us/HT214119","reference_id":"HT214119","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214119"},{"reference_url":"https://support.apple.com/en-us/HT214121","reference_id":"HT214121","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214121"},{"reference_url":"https://support.apple.com/en-us/HT214122","reference_id":"HT214122","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214122"},{"reference_url":"https://support.apple.com/en-us/HT214123","reference_id":"HT214123","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214123"},{"reference_url":"https://support.apple.com/en-us/HT214124","reference_id":"HT214124","reference_type":"","scores":[{"value":"5.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"value":"Track","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/"}],"url":"https://support.apple.com/en-us/HT214124"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8180","reference_id":"RHSA-2024:8180","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8180"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8492","reference_id":"RHSA-2024:8492","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8492"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9636","reference_id":"RHSA-2024:9636","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9636"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9646","reference_id":"RHSA-2024:9646","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9646"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6996-1/","reference_id":"USN-6996-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6996-1/"}],"fixed_packages":[],"aliases":["CVE-2024-40779"],"risk_score":3.0,"exploitability":"0.5","weighted_severity":"5.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-y77v-hwy6-hfhy"},{"url":"http://public2.vulnerablecode.io/api/vulnerabilities/41972?format=json","vulnerability_id":"VCID-ya13-9pc8-n3ht","summary":"Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution","references":[{"reference_url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json","reference_id":"","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json"},{"reference_url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23222","reference_id":"","reference_type":"","scores":[{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69696","published_at":"2026-04-13T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69723","published_at":"2026-04-11T12:55:00Z"},{"value":"0.00608","scoring_system":"epss","scoring_elements":"0.69709","published_at":"2026-04-12T12:55:00Z"},{"value":"0.00623","scoring_system":"epss","scoring_elements":"0.70076","published_at":"2026-04-02T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70137","published_at":"2026-04-04T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70178","published_at":"2026-04-09T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70162","published_at":"2026-04-08T12:55:00Z"},{"value":"0.00625","scoring_system":"epss","scoring_elements":"0.70115","published_at":"2026-04-07T12:55:00Z"}],"url":"https://api.first.org/data/v1/epss?cve=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222"},{"reference_url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271","reference_id":"","reference_type":"","scores":[],"url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271"},{"reference_url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml","reference_id":"","reference_type":"","scores":[{"value":"7.5","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}],"url":"https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml"},{"reference_url":"https://support.apple.com/en-us/118479","reference_id":"118479","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/118479"},{"reference_url":"https://support.apple.com/en-us/120304","reference_id":"120304","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120304"},{"reference_url":"https://support.apple.com/en-us/120305","reference_id":"120305","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120305"},{"reference_url":"https://support.apple.com/en-us/120307","reference_id":"120307","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120307"},{"reference_url":"https://support.apple.com/en-us/120309","reference_id":"120309","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120309"},{"reference_url":"https://support.apple.com/en-us/120310","reference_id":"120310","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120310"},{"reference_url":"https://support.apple.com/en-us/120311","reference_id":"120311","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120311"},{"reference_url":"https://support.apple.com/en-us/120339","reference_id":"120339","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/120339"},{"reference_url":"https://support.apple.com/en-us/126632","reference_id":"126632","reference_type":"","scores":[{"value":"8.8","scoring_system":"cvssv3.1","scoring_elements":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"value":"Attend","scoring_system":"ssvc","scoring_elements":"SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/"}],"url":"https://support.apple.com/en-us/126632"},{"reference_url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259893","reference_id":"2259893","reference_type":"","scores":[],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2259893"},{"reference_url":"https://security.gentoo.org/glsa/202407-13","reference_id":"GLSA-202407-13","reference_type":"","scores":[],"url":"https://security.gentoo.org/glsa/202407-13"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4201","reference_id":"RHSA-2023:4201","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4201"},{"reference_url":"https://access.redhat.com/errata/RHSA-2023:4202","reference_id":"RHSA-2023:4202","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2023:4202"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:8496","reference_id":"RHSA-2024:8496","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:8496"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9638","reference_id":"RHSA-2024:9638","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9638"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9653","reference_id":"RHSA-2024:9653","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9653"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9679","reference_id":"RHSA-2024:9679","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9679"},{"reference_url":"https://access.redhat.com/errata/RHSA-2024:9680","reference_id":"RHSA-2024:9680","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2024:9680"},{"reference_url":"https://access.redhat.com/errata/RHSA-2025:10364","reference_id":"RHSA-2025:10364","reference_type":"","scores":[],"url":"https://access.redhat.com/errata/RHSA-2025:10364"},{"reference_url":"https://usn.ubuntu.com/6631-1/","reference_id":"USN-6631-1","reference_type":"","scores":[],"url":"https://usn.ubuntu.com/6631-1/"}],"fixed_packages":[],"aliases":["CVE-2024-23222"],"risk_score":10.0,"exploitability":"2.0","weighted_severity":"7.9","resource_url":"http://public2.vulnerablecode.io/vulnerabilities/VCID-ya13-9pc8-n3ht"}],"fixing_vulnerabilities":[],"risk_score":"10.0","resource_url":"http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkit2gtk3@2.46.3-1%3Farch=el8_6"}