Lookup for vulnerable packages by Package URL.

Purlpkg:rpm/redhat/webkitgtk4@2.48.3-2?arch=el7_9
Typerpm
Namespaceredhat
Namewebkitgtk4
Version2.48.3-2
Qualifiers
arch el7_9
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-1164-uckc-qfbs
vulnerability_id VCID-1164-uckc-qfbs
summary webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40789
reference_id
reference_type
scores
0
value 0.00696
scoring_system epss
scoring_elements 0.71921
published_at 2026-04-13T12:55:00Z
1
value 0.00754
scoring_system epss
scoring_elements 0.73176
published_at 2026-04-02T12:55:00Z
2
value 0.00756
scoring_system epss
scoring_elements 0.73263
published_at 2026-04-09T12:55:00Z
3
value 0.00756
scoring_system epss
scoring_elements 0.73214
published_at 2026-04-07T12:55:00Z
4
value 0.00756
scoring_system epss
scoring_elements 0.73241
published_at 2026-04-04T12:55:00Z
5
value 0.00756
scoring_system epss
scoring_elements 0.7325
published_at 2026-04-08T12:55:00Z
6
value 0.00756
scoring_system epss
scoring_elements 0.73269
published_at 2026-04-12T12:55:00Z
7
value 0.00756
scoring_system epss
scoring_elements 0.73289
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40789
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2302067
reference_id 2302067
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2302067
19
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214116
20
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214117
21
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214119
22
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214121
23
reference_url https://support.apple.com/kb/HT214121
reference_id HT214121
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/kb/HT214121
24
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214122
25
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214123
26
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T19:47:22Z/
url https://support.apple.com/en-us/HT214124
27
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
31
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
32
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
33
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
34
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
35
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
36
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
aliases CVE-2024-40789
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1164-uckc-qfbs
1
url VCID-1e6d-p4fv-rubk
vulnerability_id VCID-1e6d-p4fv-rubk
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27808.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27808
reference_id
reference_type
scores
0
value 0.00822
scoring_system epss
scoring_elements 0.7442
published_at 2026-04-13T12:55:00Z
1
value 0.00822
scoring_system epss
scoring_elements 0.74404
published_at 2026-04-04T12:55:00Z
2
value 0.00822
scoring_system epss
scoring_elements 0.74379
published_at 2026-04-07T12:55:00Z
3
value 0.00822
scoring_system epss
scoring_elements 0.74411
published_at 2026-04-08T12:55:00Z
4
value 0.00822
scoring_system epss
scoring_elements 0.74427
published_at 2026-04-09T12:55:00Z
5
value 0.00822
scoring_system epss
scoring_elements 0.74449
published_at 2026-04-11T12:55:00Z
6
value 0.00822
scoring_system epss
scoring_elements 0.74429
published_at 2026-04-12T12:55:00Z
7
value 0.01092
scoring_system epss
scoring_elements 0.77899
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27808
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120901
9
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120902
10
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120903
11
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120905
12
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/120906
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314697
reference_id 2314697
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314697
14
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
15
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214101
16
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214102
17
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214103
18
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214104
19
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214106
20
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:58:44Z/
url https://support.apple.com/en-us/HT214108
21
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
22
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
23
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
24
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
25
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
26
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
27
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
28
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-27808
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1e6d-p4fv-rubk
2
url VCID-1fqx-3rnb-13bh
vulnerability_id VCID-1fqx-3rnb-13bh
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30953.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30953.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30953
reference_id
reference_type
scores
0
value 0.00482
scoring_system epss
scoring_elements 0.6508
published_at 2026-04-01T12:55:00Z
1
value 0.00482
scoring_system epss
scoring_elements 0.6513
published_at 2026-04-02T12:55:00Z
2
value 0.00482
scoring_system epss
scoring_elements 0.65157
published_at 2026-04-04T12:55:00Z
3
value 0.00482
scoring_system epss
scoring_elements 0.65123
published_at 2026-04-07T12:55:00Z
4
value 0.00482
scoring_system epss
scoring_elements 0.65172
published_at 2026-04-08T12:55:00Z
5
value 0.00482
scoring_system epss
scoring_elements 0.65186
published_at 2026-04-09T12:55:00Z
6
value 0.00482
scoring_system epss
scoring_elements 0.65204
published_at 2026-04-11T12:55:00Z
7
value 0.00482
scoring_system epss
scoring_elements 0.65191
published_at 2026-04-12T12:55:00Z
8
value 0.00482
scoring_system epss
scoring_elements 0.65163
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30953
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044542
reference_id 2044542
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044542
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30953
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1fqx-3rnb-13bh
3
url VCID-1jqe-8r7j-zfdu
vulnerability_id VCID-1jqe-8r7j-zfdu
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42856.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42856
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40518
published_at 2026-04-08T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40492
published_at 2026-04-13T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40545
published_at 2026-04-04T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40467
published_at 2026-04-07T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40529
published_at 2026-04-09T12:55:00Z
5
value 0.00187
scoring_system epss
scoring_elements 0.40549
published_at 2026-04-11T12:55:00Z
6
value 0.00187
scoring_system epss
scoring_elements 0.40512
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.openwall.com/lists/oss-security/2022/12/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url http://www.openwall.com/lists/oss-security/2022/12/26/1
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2153683
reference_id 2153683
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2153683
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/22
reference_id 22
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url http://seclists.org/fulldisclosure/2022/Dec/22
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
15
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
16
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://security.gentoo.org/glsa/202305-32
17
reference_url https://support.apple.com/en-us/HT213516
reference_id HT213516
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://support.apple.com/en-us/HT213516
18
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://support.apple.com/en-us/HT213531
19
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://support.apple.com/en-us/HT213532
20
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://support.apple.com/en-us/HT213535
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:34:19Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://access.redhat.com/errata/RHSA-2023:0016
reference_id RHSA-2023:0016
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0016
23
reference_url https://access.redhat.com/errata/RHSA-2023:0021
reference_id RHSA-2023:0021
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0021
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-42856
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1jqe-8r7j-zfdu
4
url VCID-1kyj-dxw1-q7a6
vulnerability_id VCID-1kyj-dxw1-q7a6
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1817.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1817.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1817
reference_id
reference_type
scores
0
value 0.0097
scoring_system epss
scoring_elements 0.76569
published_at 2026-04-01T12:55:00Z
1
value 0.0097
scoring_system epss
scoring_elements 0.76624
published_at 2026-04-13T12:55:00Z
2
value 0.0097
scoring_system epss
scoring_elements 0.76653
published_at 2026-04-11T12:55:00Z
3
value 0.0097
scoring_system epss
scoring_elements 0.76633
published_at 2026-04-12T12:55:00Z
4
value 0.0097
scoring_system epss
scoring_elements 0.76573
published_at 2026-04-02T12:55:00Z
5
value 0.0097
scoring_system epss
scoring_elements 0.76602
published_at 2026-04-04T12:55:00Z
6
value 0.0097
scoring_system epss
scoring_elements 0.76583
published_at 2026-04-07T12:55:00Z
7
value 0.0097
scoring_system epss
scoring_elements 0.76615
published_at 2026-04-08T12:55:00Z
8
value 0.0097
scoring_system epss
scoring_elements 0.76627
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1817
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986852
reference_id 1986852
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986852
14
reference_url https://security.archlinux.org/AVG-2208
reference_id AVG-2208
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2208
15
reference_url https://security.archlinux.org/AVG-2209
reference_id AVG-2209
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2209
16
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
17
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-1817
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1kyj-dxw1-q7a6
5
url VCID-1xcs-fpk3-nyg4
vulnerability_id VCID-1xcs-fpk3-nyg4
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44187.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44187
reference_id
reference_type
scores
0
value 0.00539
scoring_system epss
scoring_elements 0.67584
published_at 2026-04-13T12:55:00Z
1
value 0.00539
scoring_system epss
scoring_elements 0.67543
published_at 2026-04-02T12:55:00Z
2
value 0.00539
scoring_system epss
scoring_elements 0.67564
published_at 2026-04-04T12:55:00Z
3
value 0.00539
scoring_system epss
scoring_elements 0.67542
published_at 2026-04-07T12:55:00Z
4
value 0.00539
scoring_system epss
scoring_elements 0.67594
published_at 2026-04-08T12:55:00Z
5
value 0.00539
scoring_system epss
scoring_elements 0.67607
published_at 2026-04-09T12:55:00Z
6
value 0.00539
scoring_system epss
scoring_elements 0.6763
published_at 2026-04-11T12:55:00Z
7
value 0.00539
scoring_system epss
scoring_elements 0.67616
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44187
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44187
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-17T13:44:18Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314706
reference_id 2314706
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314706
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/7079-1/
reference_id USN-7079-1
reference_type
scores
url https://usn.ubuntu.com/7079-1/
fixed_packages
aliases CVE-2024-44187
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1xcs-fpk3-nyg4
6
url VCID-2a1d-w9tn-x3h6
vulnerability_id VCID-2a1d-w9tn-x3h6
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38600.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38600
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-13T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-11T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-12T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.71155
published_at 2026-04-04T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71138
published_at 2026-04-02T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.71185
published_at 2026-04-09T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71172
published_at 2026-04-08T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.7113
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38600
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url http://www.openwall.com/lists/oss-security/2023/08/02/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url http://www.openwall.com/lists/oss-security/2023/08/02/1
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231021
reference_id 2231021
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231021
16
reference_url https://www.debian.org/security/2023/dsa-5468
reference_id dsa-5468
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://www.debian.org/security/2023/dsa-5468
17
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://security.gentoo.org/glsa/202401-04
18
reference_url https://support.apple.com/en-us/HT213841
reference_id HT213841
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213841
19
reference_url https://support.apple.com/en-us/HT213843
reference_id HT213843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213843
20
reference_url https://support.apple.com/en-us/HT213846
reference_id HT213846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213846
21
reference_url https://support.apple.com/en-us/HT213847
reference_id HT213847
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213847
22
reference_url https://support.apple.com/en-us/HT213848
reference_id HT213848
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://support.apple.com/en-us/HT213848
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
reference_id KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJ4DG5LHWG2INDOTPB7MO4JVJN6LKL3M/
24
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
reference_id KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:27:35Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KQXJYKTGLKI6TJEFJCKPHCNY7PS72OER/
25
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
26
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
28
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38600
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2a1d-w9tn-x3h6
7
url VCID-2b9d-cej9-w3hq
vulnerability_id VCID-2b9d-cej9-w3hq
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9895.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9895.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9895
reference_id
reference_type
scores
0
value 0.02865
scoring_system epss
scoring_elements 0.86194
published_at 2026-04-01T12:55:00Z
1
value 0.02865
scoring_system epss
scoring_elements 0.86204
published_at 2026-04-02T12:55:00Z
2
value 0.02865
scoring_system epss
scoring_elements 0.86218
published_at 2026-04-07T12:55:00Z
3
value 0.02865
scoring_system epss
scoring_elements 0.86237
published_at 2026-04-08T12:55:00Z
4
value 0.02865
scoring_system epss
scoring_elements 0.86248
published_at 2026-04-09T12:55:00Z
5
value 0.02865
scoring_system epss
scoring_elements 0.86262
published_at 2026-04-11T12:55:00Z
6
value 0.02865
scoring_system epss
scoring_elements 0.8626
published_at 2026-04-12T12:55:00Z
7
value 0.02865
scoring_system epss
scoring_elements 0.86256
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9895
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879538
reference_id 1879538
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879538
11
reference_url https://security.gentoo.org/glsa/202007-61
reference_id GLSA-202007-61
reference_type
scores
url https://security.gentoo.org/glsa/202007-61
12
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/4444-1/
reference_id USN-4444-1
reference_type
scores
url https://usn.ubuntu.com/4444-1/
fixed_packages
aliases CVE-2020-9895
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2b9d-cej9-w3hq
8
url VCID-2nmg-6jk2-ebcb
vulnerability_id VCID-2nmg-6jk2-ebcb
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44296.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44296
reference_id
reference_type
scores
0
value 0.00664
scoring_system epss
scoring_elements 0.71183
published_at 2026-04-13T12:55:00Z
1
value 0.00664
scoring_system epss
scoring_elements 0.71143
published_at 2026-04-02T12:55:00Z
2
value 0.00664
scoring_system epss
scoring_elements 0.71161
published_at 2026-04-04T12:55:00Z
3
value 0.00664
scoring_system epss
scoring_elements 0.71136
published_at 2026-04-07T12:55:00Z
4
value 0.00664
scoring_system epss
scoring_elements 0.71178
published_at 2026-04-08T12:55:00Z
5
value 0.00664
scoring_system epss
scoring_elements 0.71191
published_at 2026-04-09T12:55:00Z
6
value 0.00664
scoring_system epss
scoring_elements 0.71214
published_at 2026-04-11T12:55:00Z
7
value 0.00664
scoring_system epss
scoring_elements 0.712
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44296
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44296
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121563
reference_id 121563
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121563
5
reference_url https://support.apple.com/en-us/121564
reference_id 121564
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121564
6
reference_url https://support.apple.com/en-us/121565
reference_id 121565
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121565
7
reference_url https://support.apple.com/en-us/121566
reference_id 121566
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121566
8
reference_url https://support.apple.com/en-us/121567
reference_id 121567
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121567
9
reference_url https://support.apple.com/en-us/121569
reference_id 121569
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121569
10
reference_url https://support.apple.com/en-us/121571
reference_id 121571
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T14:21:50Z/
url https://support.apple.com/en-us/121571
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323289
reference_id 2323289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323289
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2024:9545
reference_id RHSA-2024:9545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9545
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/7113-1/
reference_id USN-7113-1
reference_type
scores
url https://usn.ubuntu.com/7113-1/
fixed_packages
aliases CVE-2024-44296
risk_score 2.5
exploitability 0.5
weighted_severity 4.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2nmg-6jk2-ebcb
9
url VCID-2rm2-f5xj-1bb2
vulnerability_id VCID-2rm2-f5xj-1bb2
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24208.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24208
reference_id
reference_type
scores
0
value 0.00315
scoring_system epss
scoring_elements 0.54584
published_at 2026-04-02T12:55:00Z
1
value 0.00315
scoring_system epss
scoring_elements 0.54598
published_at 2026-04-13T12:55:00Z
2
value 0.00315
scoring_system epss
scoring_elements 0.54577
published_at 2026-04-07T12:55:00Z
3
value 0.00315
scoring_system epss
scoring_elements 0.54629
published_at 2026-04-08T12:55:00Z
4
value 0.00315
scoring_system epss
scoring_elements 0.54623
published_at 2026-04-09T12:55:00Z
5
value 0.00315
scoring_system epss
scoring_elements 0.54636
published_at 2026-04-11T12:55:00Z
6
value 0.00315
scoring_system epss
scoring_elements 0.54619
published_at 2026-04-12T12:55:00Z
7
value 0.00315
scoring_system epss
scoring_elements 0.54608
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24208
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24208
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T20:39:59Z/
url https://support.apple.com/en-us/122379
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357910
reference_id 2357910
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357910
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
10
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
11
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
12
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
13
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
14
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
15
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
16
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
17
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
18
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
19
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
aliases CVE-2025-24208
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2rm2-f5xj-1bb2
10
url VCID-2umj-w8zs-m3em
vulnerability_id VCID-2umj-w8zs-m3em
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30889.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30889.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30889
reference_id
reference_type
scores
0
value 0.00685
scoring_system epss
scoring_elements 0.71641
published_at 2026-04-01T12:55:00Z
1
value 0.00685
scoring_system epss
scoring_elements 0.71647
published_at 2026-04-02T12:55:00Z
2
value 0.00685
scoring_system epss
scoring_elements 0.71665
published_at 2026-04-04T12:55:00Z
3
value 0.00685
scoring_system epss
scoring_elements 0.71638
published_at 2026-04-07T12:55:00Z
4
value 0.00685
scoring_system epss
scoring_elements 0.71678
published_at 2026-04-08T12:55:00Z
5
value 0.00685
scoring_system epss
scoring_elements 0.71688
published_at 2026-04-09T12:55:00Z
6
value 0.00685
scoring_system epss
scoring_elements 0.71712
published_at 2026-04-11T12:55:00Z
7
value 0.00685
scoring_system epss
scoring_elements 0.71695
published_at 2026-04-12T12:55:00Z
8
value 0.00685
scoring_system epss
scoring_elements 0.71677
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30889
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034386
reference_id 2034386
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034386
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30889
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2umj-w8zs-m3em
11
url VCID-2vkd-zenq-eugp
vulnerability_id VCID-2vkd-zenq-eugp
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9893.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9893.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9893
reference_id
reference_type
scores
0
value 0.02179
scoring_system epss
scoring_elements 0.8428
published_at 2026-04-01T12:55:00Z
1
value 0.02179
scoring_system epss
scoring_elements 0.84293
published_at 2026-04-02T12:55:00Z
2
value 0.02179
scoring_system epss
scoring_elements 0.84312
published_at 2026-04-04T12:55:00Z
3
value 0.02179
scoring_system epss
scoring_elements 0.84314
published_at 2026-04-07T12:55:00Z
4
value 0.02179
scoring_system epss
scoring_elements 0.84335
published_at 2026-04-08T12:55:00Z
5
value 0.02179
scoring_system epss
scoring_elements 0.84341
published_at 2026-04-09T12:55:00Z
6
value 0.02179
scoring_system epss
scoring_elements 0.84359
published_at 2026-04-11T12:55:00Z
7
value 0.02179
scoring_system epss
scoring_elements 0.84351
published_at 2026-04-12T12:55:00Z
8
value 0.02179
scoring_system epss
scoring_elements 0.84348
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9893
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879535
reference_id 1879535
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879535
11
reference_url https://security.gentoo.org/glsa/202007-61
reference_id GLSA-202007-61
reference_type
scores
url https://security.gentoo.org/glsa/202007-61
12
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/4444-1/
reference_id USN-4444-1
reference_type
scores
url https://usn.ubuntu.com/4444-1/
fixed_packages
aliases CVE-2020-9893
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vkd-zenq-eugp
12
url VCID-2vtf-gudd-9fah
vulnerability_id VCID-2vtf-gudd-9fah
summary WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54479.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54479
reference_id
reference_type
scores
0
value 0.007
scoring_system epss
scoring_elements 0.71986
published_at 2026-04-13T12:55:00Z
1
value 0.007
scoring_system epss
scoring_elements 0.71947
published_at 2026-04-02T12:55:00Z
2
value 0.007
scoring_system epss
scoring_elements 0.71966
published_at 2026-04-04T12:55:00Z
3
value 0.007
scoring_system epss
scoring_elements 0.71943
published_at 2026-04-07T12:55:00Z
4
value 0.007
scoring_system epss
scoring_elements 0.71982
published_at 2026-04-08T12:55:00Z
5
value 0.007
scoring_system epss
scoring_elements 0.71994
published_at 2026-04-09T12:55:00Z
6
value 0.007
scoring_system epss
scoring_elements 0.72018
published_at 2026-04-11T12:55:00Z
7
value 0.007
scoring_system epss
scoring_elements 0.72001
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54479
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54479
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121838
reference_id 121838
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121838
6
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121839
7
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121843
8
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121844
9
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121845
10
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-20T18:33:06Z/
url https://support.apple.com/en-us/121846
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333841
reference_id 2333841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333841
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
aliases CVE-2024-54479
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-2vtf-gudd-9fah
13
url VCID-37kv-4cp4-5fas
vulnerability_id VCID-37kv-4cp4-5fas
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30846.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30846.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30846
reference_id
reference_type
scores
0
value 0.00503
scoring_system epss
scoring_elements 0.66006
published_at 2026-04-01T12:55:00Z
1
value 0.00503
scoring_system epss
scoring_elements 0.6608
published_at 2026-04-13T12:55:00Z
2
value 0.00503
scoring_system epss
scoring_elements 0.66104
published_at 2026-04-09T12:55:00Z
3
value 0.00503
scoring_system epss
scoring_elements 0.66123
published_at 2026-04-11T12:55:00Z
4
value 0.00503
scoring_system epss
scoring_elements 0.6611
published_at 2026-04-12T12:55:00Z
5
value 0.00503
scoring_system epss
scoring_elements 0.66048
published_at 2026-04-02T12:55:00Z
6
value 0.00503
scoring_system epss
scoring_elements 0.66076
published_at 2026-04-04T12:55:00Z
7
value 0.00503
scoring_system epss
scoring_elements 0.66043
published_at 2026-04-07T12:55:00Z
8
value 0.00503
scoring_system epss
scoring_elements 0.66091
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30846
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2017898
reference_id 2017898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2017898
14
reference_url https://security.archlinux.org/ASA-202110-10
reference_id ASA-202110-10
reference_type
scores
url https://security.archlinux.org/ASA-202110-10
15
reference_url https://security.archlinux.org/ASA-202110-9
reference_id ASA-202110-9
reference_type
scores
url https://security.archlinux.org/ASA-202110-9
16
reference_url https://security.archlinux.org/AVG-2483
reference_id AVG-2483
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2483
17
reference_url https://security.archlinux.org/AVG-2484
reference_id AVG-2484
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2484
18
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
19
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/5127-1/
reference_id USN-5127-1
reference_type
scores
url https://usn.ubuntu.com/5127-1/
fixed_packages
aliases CVE-2021-30846
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-37kv-4cp4-5fas
14
url VCID-3ab6-tntn-67eb
vulnerability_id VCID-3ab6-tntn-67eb
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28204.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28204
reference_id
reference_type
scores
0
value 0.0007
scoring_system epss
scoring_elements 0.21726
published_at 2026-04-02T12:55:00Z
1
value 0.0007
scoring_system epss
scoring_elements 0.21581
published_at 2026-04-13T12:55:00Z
2
value 0.0007
scoring_system epss
scoring_elements 0.21781
published_at 2026-04-04T12:55:00Z
3
value 0.0007
scoring_system epss
scoring_elements 0.21531
published_at 2026-04-07T12:55:00Z
4
value 0.0007
scoring_system epss
scoring_elements 0.21607
published_at 2026-04-08T12:55:00Z
5
value 0.0007
scoring_system epss
scoring_elements 0.21665
published_at 2026-04-09T12:55:00Z
6
value 0.0007
scoring_system epss
scoring_elements 0.21677
published_at 2026-04-11T12:55:00Z
7
value 0.0007
scoring_system epss
scoring_elements 0.21639
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2209208
reference_id 2209208
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2209208
5
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://security.gentoo.org/glsa/202401-04
6
reference_url https://support.apple.com/en-us/HT213757
reference_id HT213757
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213757
7
reference_url https://support.apple.com/en-us/HT213758
reference_id HT213758
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213758
8
reference_url https://support.apple.com/en-us/HT213761
reference_id HT213761
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213761
9
reference_url https://support.apple.com/en-us/HT213762
reference_id HT213762
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213762
10
reference_url https://support.apple.com/en-us/HT213764
reference_id HT213764
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213764
11
reference_url https://support.apple.com/en-us/HT213765
reference_id HT213765
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-04T15:11:51Z/
url https://support.apple.com/en-us/HT213765
12
reference_url https://access.redhat.com/errata/RHSA-2023:3432
reference_id RHSA-2023:3432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3432
13
reference_url https://access.redhat.com/errata/RHSA-2023:3433
reference_id RHSA-2023:3433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3433
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
aliases CVE-2023-28204
risk_score 10.0
exploitability 2.0
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ab6-tntn-67eb
15
url VCID-3daw-8nh6-dfcq
vulnerability_id VCID-3daw-8nh6-dfcq
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44185.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44185
reference_id
reference_type
scores
0
value 0.00038
scoring_system epss
scoring_elements 0.1148
published_at 2026-04-13T12:55:00Z
1
value 0.00038
scoring_system epss
scoring_elements 0.11549
published_at 2026-04-02T12:55:00Z
2
value 0.00038
scoring_system epss
scoring_elements 0.11603
published_at 2026-04-04T12:55:00Z
3
value 0.00038
scoring_system epss
scoring_elements 0.11392
published_at 2026-04-07T12:55:00Z
4
value 0.00038
scoring_system epss
scoring_elements 0.11476
published_at 2026-04-08T12:55:00Z
5
value 0.00038
scoring_system epss
scoring_elements 0.11535
published_at 2026-04-09T12:55:00Z
6
value 0.00038
scoring_system epss
scoring_elements 0.11545
published_at 2026-04-11T12:55:00Z
7
value 0.00038
scoring_system epss
scoring_elements 0.11511
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44185
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44185
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120909
5
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120911
6
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120913
7
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120914
8
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120915
9
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-24T18:14:04Z/
url https://support.apple.com/en-us/120916
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323263
reference_id 2323263
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323263
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2024:9637
reference_id RHSA-2024:9637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9637
16
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-44185
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3daw-8nh6-dfcq
16
url VCID-3ed7-5bwx-5fd3
vulnerability_id VCID-3ed7-5bwx-5fd3
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9803.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9803.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9803
reference_id
reference_type
scores
0
value 0.00256
scoring_system epss
scoring_elements 0.48945
published_at 2026-04-01T12:55:00Z
1
value 0.00256
scoring_system epss
scoring_elements 0.49008
published_at 2026-04-13T12:55:00Z
2
value 0.00256
scoring_system epss
scoring_elements 0.49028
published_at 2026-04-11T12:55:00Z
3
value 0.00256
scoring_system epss
scoring_elements 0.49001
published_at 2026-04-12T12:55:00Z
4
value 0.00256
scoring_system epss
scoring_elements 0.48981
published_at 2026-04-02T12:55:00Z
5
value 0.00256
scoring_system epss
scoring_elements 0.49007
published_at 2026-04-04T12:55:00Z
6
value 0.00256
scoring_system epss
scoring_elements 0.48961
published_at 2026-04-07T12:55:00Z
7
value 0.00256
scoring_system epss
scoring_elements 0.49015
published_at 2026-04-08T12:55:00Z
8
value 0.00256
scoring_system epss
scoring_elements 0.49011
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9803
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879557
reference_id 1879557
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879557
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
aliases CVE-2020-9803
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ed7-5bwx-5fd3
17
url VCID-3frv-ppjt-9bdy
vulnerability_id VCID-3frv-ppjt-9bdy
summary webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24143.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24143
reference_id
reference_type
scores
0
value 0.00131
scoring_system epss
scoring_elements 0.32688
published_at 2026-04-02T12:55:00Z
1
value 0.00131
scoring_system epss
scoring_elements 0.32555
published_at 2026-04-13T12:55:00Z
2
value 0.00131
scoring_system epss
scoring_elements 0.32723
published_at 2026-04-04T12:55:00Z
3
value 0.00131
scoring_system epss
scoring_elements 0.32544
published_at 2026-04-07T12:55:00Z
4
value 0.00131
scoring_system epss
scoring_elements 0.32592
published_at 2026-04-08T12:55:00Z
5
value 0.00131
scoring_system epss
scoring_elements 0.32618
published_at 2026-04-09T12:55:00Z
6
value 0.00131
scoring_system epss
scoring_elements 0.3262
published_at 2026-04-11T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32581
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24143
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24143
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122073
7
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T19:38:50Z/
url https://support.apple.com/en-us/122074
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344621
reference_id 2344621
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344621
9
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
10
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
11
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
12
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
aliases CVE-2025-24143
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3frv-ppjt-9bdy
18
url VCID-3ghs-su4t-cqg7
vulnerability_id VCID-3ghs-su4t-cqg7
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30744.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30744.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30744
reference_id
reference_type
scores
0
value 0.0061
scoring_system epss
scoring_elements 0.69685
published_at 2026-04-01T12:55:00Z
1
value 0.0061
scoring_system epss
scoring_elements 0.69747
published_at 2026-04-13T12:55:00Z
2
value 0.0061
scoring_system epss
scoring_elements 0.69776
published_at 2026-04-11T12:55:00Z
3
value 0.0061
scoring_system epss
scoring_elements 0.69761
published_at 2026-04-12T12:55:00Z
4
value 0.0061
scoring_system epss
scoring_elements 0.69697
published_at 2026-04-02T12:55:00Z
5
value 0.0061
scoring_system epss
scoring_elements 0.69713
published_at 2026-04-04T12:55:00Z
6
value 0.0061
scoring_system epss
scoring_elements 0.6969
published_at 2026-04-07T12:55:00Z
7
value 0.0061
scoring_system epss
scoring_elements 0.69738
published_at 2026-04-08T12:55:00Z
8
value 0.0061
scoring_system epss
scoring_elements 0.69755
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30744
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986888
reference_id 1986888
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986888
16
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
17
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
18
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
19
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
20
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
21
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30744
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3ghs-su4t-cqg7
19
url VCID-3r9c-5ys2-43hw
vulnerability_id VCID-3r9c-5ys2-43hw
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38597.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38597
reference_id
reference_type
scores
0
value 0.00328
scoring_system epss
scoring_elements 0.55836
published_at 2026-04-13T12:55:00Z
1
value 0.00328
scoring_system epss
scoring_elements 0.55875
published_at 2026-04-11T12:55:00Z
2
value 0.00328
scoring_system epss
scoring_elements 0.55855
published_at 2026-04-12T12:55:00Z
3
value 0.00536
scoring_system epss
scoring_elements 0.67436
published_at 2026-04-07T12:55:00Z
4
value 0.00536
scoring_system epss
scoring_elements 0.67488
published_at 2026-04-08T12:55:00Z
5
value 0.00536
scoring_system epss
scoring_elements 0.67502
published_at 2026-04-09T12:55:00Z
6
value 0.00536
scoring_system epss
scoring_elements 0.67435
published_at 2026-04-02T12:55:00Z
7
value 0.00536
scoring_system epss
scoring_elements 0.67457
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38597
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231043
reference_id 2231043
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231043
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38597
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3r9c-5ys2-43hw
20
url VCID-3udf-shtq-g7br
vulnerability_id VCID-3udf-shtq-g7br
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1799.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1799
reference_id
reference_type
scores
0
value 0.00127
scoring_system epss
scoring_elements 0.31983
published_at 2026-04-01T12:55:00Z
1
value 0.00127
scoring_system epss
scoring_elements 0.31984
published_at 2026-04-13T12:55:00Z
2
value 0.00127
scoring_system epss
scoring_elements 0.32053
published_at 2026-04-09T12:55:00Z
3
value 0.00127
scoring_system epss
scoring_elements 0.32057
published_at 2026-04-11T12:55:00Z
4
value 0.00127
scoring_system epss
scoring_elements 0.32018
published_at 2026-04-12T12:55:00Z
5
value 0.00127
scoring_system epss
scoring_elements 0.32111
published_at 2026-04-02T12:55:00Z
6
value 0.00127
scoring_system epss
scoring_elements 0.3215
published_at 2026-04-04T12:55:00Z
7
value 0.00127
scoring_system epss
scoring_elements 0.31973
published_at 2026-04-07T12:55:00Z
8
value 0.00127
scoring_system epss
scoring_elements 0.32024
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944340
reference_id 1944340
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944340
12
reference_url https://security.archlinux.org/ASA-202103-24
reference_id ASA-202103-24
reference_type
scores
url https://security.archlinux.org/ASA-202103-24
13
reference_url https://security.archlinux.org/ASA-202103-25
reference_id ASA-202103-25
reference_type
scores
url https://security.archlinux.org/ASA-202103-25
14
reference_url https://security.archlinux.org/AVG-1721
reference_id AVG-1721
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1721
15
reference_url https://security.archlinux.org/AVG-1722
reference_id AVG-1722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1722
16
reference_url https://security.gentoo.org/glsa/202104-03
reference_id GLSA-202104-03
reference_type
scores
url https://security.gentoo.org/glsa/202104-03
17
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/4894-1/
reference_id USN-4894-1
reference_type
scores
url https://usn.ubuntu.com/4894-1/
fixed_packages
aliases CVE-2021-1799
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3udf-shtq-g7br
21
url VCID-3yjx-gswx-g3gt
vulnerability_id VCID-3yjx-gswx-g3gt
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23213.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23213
reference_id
reference_type
scores
0
value 0.00394
scoring_system epss
scoring_elements 0.60257
published_at 2026-04-02T12:55:00Z
1
value 0.00395
scoring_system epss
scoring_elements 0.60381
published_at 2026-04-12T12:55:00Z
2
value 0.00395
scoring_system epss
scoring_elements 0.60394
published_at 2026-04-11T12:55:00Z
3
value 0.00395
scoring_system epss
scoring_elements 0.60373
published_at 2026-04-09T12:55:00Z
4
value 0.00395
scoring_system epss
scoring_elements 0.60358
published_at 2026-04-08T12:55:00Z
5
value 0.00395
scoring_system epss
scoring_elements 0.60309
published_at 2026-04-07T12:55:00Z
6
value 0.00395
scoring_system epss
scoring_elements 0.60341
published_at 2026-04-04T12:55:00Z
7
value 0.00395
scoring_system epss
scoring_elements 0.60362
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120304
reference_id 120304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120304
8
reference_url https://support.apple.com/en-us/120306
reference_id 120306
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120306
9
reference_url https://support.apple.com/en-us/120309
reference_id 120309
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120309
10
reference_url https://support.apple.com/en-us/120310
reference_id 120310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120310
11
reference_url https://support.apple.com/en-us/120311
reference_id 120311
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120311
12
reference_url https://support.apple.com/en-us/120339
reference_id 120339
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/120339
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270141
reference_id 2270141
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270141
14
reference_url http://seclists.org/fulldisclosure/2024/Jan/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/27
15
reference_url http://seclists.org/fulldisclosure/2024/Jan/33
reference_id 33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/33
16
reference_url http://seclists.org/fulldisclosure/2024/Jan/34
reference_id 34
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/34
17
reference_url http://seclists.org/fulldisclosure/2024/Jan/36
reference_id 36
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/36
18
reference_url http://seclists.org/fulldisclosure/2024/Jan/39
reference_id 39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/39
19
reference_url http://seclists.org/fulldisclosure/2024/Jan/40
reference_id 40
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://seclists.org/fulldisclosure/2024/Jan/40
20
reference_url http://www.openwall.com/lists/oss-security/2024/02/05/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url http://www.openwall.com/lists/oss-security/2024/02/05/8
21
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
22
reference_url https://support.apple.com/en-us/HT214055
reference_id HT214055
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214055
23
reference_url https://support.apple.com/kb/HT214055
reference_id HT214055
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214055
24
reference_url https://support.apple.com/en-us/HT214056
reference_id HT214056
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214056
25
reference_url https://support.apple.com/kb/HT214056
reference_id HT214056
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214056
26
reference_url https://support.apple.com/en-us/HT214059
reference_id HT214059
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214059
27
reference_url https://support.apple.com/kb/HT214059
reference_id HT214059
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214059
28
reference_url https://support.apple.com/en-us/HT214060
reference_id HT214060
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214060
29
reference_url https://support.apple.com/kb/HT214060
reference_id HT214060
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214060
30
reference_url https://support.apple.com/en-us/HT214061
reference_id HT214061
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214061
31
reference_url https://support.apple.com/kb/HT214061
reference_id HT214061
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214061
32
reference_url https://support.apple.com/en-us/HT214063
reference_id HT214063
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/en-us/HT214063
33
reference_url https://support.apple.com/kb/HT214063
reference_id HT214063
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://support.apple.com/kb/HT214063
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
reference_id US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/US43EQFC2IS66EA2CPAZFH2RQ6WD7PKF/
36
reference_url https://usn.ubuntu.com/6631-1/
reference_id USN-6631-1
reference_type
scores
url https://usn.ubuntu.com/6631-1/
37
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
reference_id X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-06T05:00:12Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/X2VJMEDT4GL42AQVHSYOT6DIVJDZWIV4/
fixed_packages
aliases CVE-2024-23213
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-3yjx-gswx-g3gt
22
url VCID-455j-vpxx-yudd
vulnerability_id VCID-455j-vpxx-yudd
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23284.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23284.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23284
reference_id
reference_type
scores
0
value 0.00881
scoring_system epss
scoring_elements 0.75325
published_at 2026-04-02T12:55:00Z
1
value 0.00884
scoring_system epss
scoring_elements 0.7543
published_at 2026-04-12T12:55:00Z
2
value 0.00884
scoring_system epss
scoring_elements 0.75452
published_at 2026-04-11T12:55:00Z
3
value 0.00884
scoring_system epss
scoring_elements 0.75432
published_at 2026-04-09T12:55:00Z
4
value 0.00884
scoring_system epss
scoring_elements 0.75423
published_at 2026-04-08T12:55:00Z
5
value 0.00884
scoring_system epss
scoring_elements 0.7538
published_at 2026-04-07T12:55:00Z
6
value 0.00884
scoring_system epss
scoring_elements 0.754
published_at 2026-04-04T12:55:00Z
7
value 0.00884
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23284
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120880
reference_id 120880
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120880
14
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120881
15
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120882
16
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120883
17
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120893
18
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120894
19
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/120895
20
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270292
reference_id 2270292
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270292
22
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
23
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
24
reference_url http://seclists.org/fulldisclosure/2024/Mar/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url http://seclists.org/fulldisclosure/2024/Mar/26
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
reference_id AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
reference_id BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
27
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
28
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214081
29
reference_url https://support.apple.com/en-us/HT214082
reference_id HT214082
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214082
30
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214084
31
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214086
32
reference_url https://support.apple.com/en-us/HT214087
reference_id HT214087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214087
33
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214088
34
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://support.apple.com/en-us/HT214089
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
reference_id PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-07T04:00:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
37
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
38
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
39
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
40
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
aliases CVE-2024-23284
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-455j-vpxx-yudd
23
url VCID-48jv-7tnc-8fb3
vulnerability_id VCID-48jv-7tnc-8fb3
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22620.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22620.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22620
reference_id
reference_type
scores
0
value 0.04022
scoring_system epss
scoring_elements 0.88469
published_at 2026-04-13T12:55:00Z
1
value 0.04022
scoring_system epss
scoring_elements 0.8843
published_at 2026-04-02T12:55:00Z
2
value 0.04022
scoring_system epss
scoring_elements 0.88438
published_at 2026-04-04T12:55:00Z
3
value 0.04022
scoring_system epss
scoring_elements 0.88442
published_at 2026-04-07T12:55:00Z
4
value 0.04022
scoring_system epss
scoring_elements 0.8846
published_at 2026-04-08T12:55:00Z
5
value 0.04022
scoring_system epss
scoring_elements 0.88466
published_at 2026-04-09T12:55:00Z
6
value 0.04022
scoring_system epss
scoring_elements 0.88477
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22620
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2056474
reference_id 2056474
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2056474
8
reference_url https://security.archlinux.org/AVG-2649
reference_id AVG-2649
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2649
9
reference_url https://security.archlinux.org/AVG-2650
reference_id AVG-2650
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2650
10
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/
url https://security.gentoo.org/glsa/202208-39
11
reference_url https://support.apple.com/en-us/HT213091
reference_id HT213091
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/
url https://support.apple.com/en-us/HT213091
12
reference_url https://support.apple.com/en-us/HT213092
reference_id HT213092
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/
url https://support.apple.com/en-us/HT213092
13
reference_url https://support.apple.com/en-us/HT213093
reference_id HT213093
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:36:15Z/
url https://support.apple.com/en-us/HT213093
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-22620
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-48jv-7tnc-8fb3
24
url VCID-4a1y-uhze-syfg
vulnerability_id VCID-4a1y-uhze-syfg
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45482.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45482.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45482
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07937
published_at 2026-04-01T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08036
published_at 2026-04-02T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.08079
published_at 2026-04-04T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.08042
published_at 2026-04-07T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08102
published_at 2026-04-08T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08124
published_at 2026-04-09T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08115
published_at 2026-04-11T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08095
published_at 2026-04-12T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.08078
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45482
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040329
reference_id 2040329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040329
9
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
10
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-45482
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4a1y-uhze-syfg
25
url VCID-4dcz-sdeb-p7ar
vulnerability_id VCID-4dcz-sdeb-p7ar
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30795.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30795.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30795
reference_id
reference_type
scores
0
value 0.00914
scoring_system epss
scoring_elements 0.75823
published_at 2026-04-01T12:55:00Z
1
value 0.00914
scoring_system epss
scoring_elements 0.75881
published_at 2026-04-13T12:55:00Z
2
value 0.00914
scoring_system epss
scoring_elements 0.75906
published_at 2026-04-11T12:55:00Z
3
value 0.00914
scoring_system epss
scoring_elements 0.75888
published_at 2026-04-12T12:55:00Z
4
value 0.00914
scoring_system epss
scoring_elements 0.75826
published_at 2026-04-02T12:55:00Z
5
value 0.00914
scoring_system epss
scoring_elements 0.75859
published_at 2026-04-04T12:55:00Z
6
value 0.00914
scoring_system epss
scoring_elements 0.75837
published_at 2026-04-07T12:55:00Z
7
value 0.00914
scoring_system epss
scoring_elements 0.7587
published_at 2026-04-08T12:55:00Z
8
value 0.00914
scoring_system epss
scoring_elements 0.75883
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30795
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986900
reference_id 1986900
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986900
16
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
17
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
18
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
19
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
20
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
21
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30795
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4dcz-sdeb-p7ar
26
url VCID-4fv8-5wm3-byf9
vulnerability_id VCID-4fv8-5wm3-byf9
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30665.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30665.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30665
reference_id
reference_type
scores
0
value 0.00608
scoring_system epss
scoring_elements 0.69615
published_at 2026-04-01T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69684
published_at 2026-04-13T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69627
published_at 2026-04-02T12:55:00Z
3
value 0.00608
scoring_system epss
scoring_elements 0.69643
published_at 2026-04-04T12:55:00Z
4
value 0.00608
scoring_system epss
scoring_elements 0.69622
published_at 2026-04-07T12:55:00Z
5
value 0.00608
scoring_system epss
scoring_elements 0.69673
published_at 2026-04-08T12:55:00Z
6
value 0.00608
scoring_system epss
scoring_elements 0.6969
published_at 2026-04-09T12:55:00Z
7
value 0.00608
scoring_system epss
scoring_elements 0.69712
published_at 2026-04-11T12:55:00Z
8
value 0.00608
scoring_system epss
scoring_elements 0.69698
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30665
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986874
reference_id 1986874
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986874
16
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
17
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
18
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
19
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
20
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
21
reference_url https://support.apple.com/en-us/HT212335
reference_id HT212335
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/
url https://support.apple.com/en-us/HT212335
22
reference_url https://support.apple.com/en-us/HT212336
reference_id HT212336
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/
url https://support.apple.com/en-us/HT212336
23
reference_url https://support.apple.com/en-us/HT212339
reference_id HT212339
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/
url https://support.apple.com/en-us/HT212339
24
reference_url https://support.apple.com/en-us/HT212341
reference_id HT212341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/
url https://support.apple.com/en-us/HT212341
25
reference_url https://support.apple.com/en-us/HT212532
reference_id HT212532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:26:21Z/
url https://support.apple.com/en-us/HT212532
26
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
28
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30665
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4fv8-5wm3-byf9
27
url VCID-4kzn-hfnz-3faf
vulnerability_id VCID-4kzn-hfnz-3faf
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40451.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40451
reference_id
reference_type
scores
0
value 0.00272
scoring_system epss
scoring_elements 0.5062
published_at 2026-04-02T12:55:00Z
1
value 0.00272
scoring_system epss
scoring_elements 0.50658
published_at 2026-04-13T12:55:00Z
2
value 0.00272
scoring_system epss
scoring_elements 0.50602
published_at 2026-04-07T12:55:00Z
3
value 0.00272
scoring_system epss
scoring_elements 0.50657
published_at 2026-04-08T12:55:00Z
4
value 0.00272
scoring_system epss
scoring_elements 0.50653
published_at 2026-04-09T12:55:00Z
5
value 0.00272
scoring_system epss
scoring_elements 0.50695
published_at 2026-04-11T12:55:00Z
6
value 0.00272
scoring_system epss
scoring_elements 0.50673
published_at 2026-04-12T12:55:00Z
7
value 0.00272
scoring_system epss
scoring_elements 0.50647
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40451
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://seclists.org/fulldisclosure/2023/Oct/2
reference_id 2
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url http://seclists.org/fulldisclosure/2023/Oct/2
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241409
reference_id 2241409
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241409
17
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/3
reference_id 3
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/3
18
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url https://security.gentoo.org/glsa/202401-33
19
reference_url https://support.apple.com/en-us/HT213941
reference_id HT213941
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-02-01T19:54:23Z/
url https://support.apple.com/en-us/HT213941
20
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
21
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-40451
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4kzn-hfnz-3faf
28
url VCID-4mbv-yf9n-puck
vulnerability_id VCID-4mbv-yf9n-puck
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30887.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30887.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30887
reference_id
reference_type
scores
0
value 0.00304
scoring_system epss
scoring_elements 0.53579
published_at 2026-04-01T12:55:00Z
1
value 0.00304
scoring_system epss
scoring_elements 0.53603
published_at 2026-04-02T12:55:00Z
2
value 0.00304
scoring_system epss
scoring_elements 0.53631
published_at 2026-04-04T12:55:00Z
3
value 0.00304
scoring_system epss
scoring_elements 0.536
published_at 2026-04-07T12:55:00Z
4
value 0.00304
scoring_system epss
scoring_elements 0.53652
published_at 2026-04-08T12:55:00Z
5
value 0.00304
scoring_system epss
scoring_elements 0.5365
published_at 2026-04-09T12:55:00Z
6
value 0.00304
scoring_system epss
scoring_elements 0.53699
published_at 2026-04-11T12:55:00Z
7
value 0.00304
scoring_system epss
scoring_elements 0.53682
published_at 2026-04-12T12:55:00Z
8
value 0.00304
scoring_system epss
scoring_elements 0.53665
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30887
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034381
reference_id 2034381
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034381
6
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
7
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://usn.ubuntu.com/5213-1/
reference_id USN-5213-1
reference_type
scores
url https://usn.ubuntu.com/5213-1/
fixed_packages
aliases CVE-2021-30887
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4mbv-yf9n-puck
29
url VCID-4tnr-2yst-m3b8
vulnerability_id VCID-4tnr-2yst-m3b8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46699.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46699.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46699
reference_id
reference_type
scores
0
value 0.00689
scoring_system epss
scoring_elements 0.71715
published_at 2026-04-02T12:55:00Z
1
value 0.00689
scoring_system epss
scoring_elements 0.71747
published_at 2026-04-13T12:55:00Z
2
value 0.00689
scoring_system epss
scoring_elements 0.71733
published_at 2026-04-04T12:55:00Z
3
value 0.00689
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-07T12:55:00Z
4
value 0.00689
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-08T12:55:00Z
5
value 0.00689
scoring_system epss
scoring_elements 0.71758
published_at 2026-04-09T12:55:00Z
6
value 0.00689
scoring_system epss
scoring_elements 0.71782
published_at 2026-04-11T12:55:00Z
7
value 0.00689
scoring_system epss
scoring_elements 0.71765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46699
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156993
reference_id 2156993
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156993
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213532
18
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213535
19
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213536
20
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:45:37Z/
url https://support.apple.com/en-us/HT213537
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-46699
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4tnr-2yst-m3b8
30
url VCID-4vn7-zfkq-a7dm
vulnerability_id VCID-4vn7-zfkq-a7dm
summary webkitgtk: A malicious website may exfiltrate data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22594.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22594
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44162
published_at 2026-04-02T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44185
published_at 2026-04-04T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44117
published_at 2026-04-07T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44168
published_at 2026-04-08T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44171
published_at 2026-04-09T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44187
published_at 2026-04-11T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44154
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2045291
reference_id 2045291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2045291
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-22594
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-4vn7-zfkq-a7dm
31
url VCID-5334-8qf3-tqbp
vulnerability_id VCID-5334-8qf3-tqbp
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32373.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32373.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32373
reference_id
reference_type
scores
0
value 0.00042
scoring_system epss
scoring_elements 0.13004
published_at 2026-04-02T12:55:00Z
1
value 0.00042
scoring_system epss
scoring_elements 0.12861
published_at 2026-04-13T12:55:00Z
2
value 0.00042
scoring_system epss
scoring_elements 0.13053
published_at 2026-04-04T12:55:00Z
3
value 0.00042
scoring_system epss
scoring_elements 0.12853
published_at 2026-04-07T12:55:00Z
4
value 0.00042
scoring_system epss
scoring_elements 0.12931
published_at 2026-04-08T12:55:00Z
5
value 0.00042
scoring_system epss
scoring_elements 0.12982
published_at 2026-04-09T12:55:00Z
6
value 0.00042
scoring_system epss
scoring_elements 0.12942
published_at 2026-04-11T12:55:00Z
7
value 0.00042
scoring_system epss
scoring_elements 0.12906
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32373
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28204
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32373
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2209214
reference_id 2209214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2209214
6
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://security.gentoo.org/glsa/202401-04
7
reference_url https://support.apple.com/en-us/HT213757
reference_id HT213757
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213757
8
reference_url https://support.apple.com/en-us/HT213758
reference_id HT213758
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213758
9
reference_url https://support.apple.com/en-us/HT213761
reference_id HT213761
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213761
10
reference_url https://support.apple.com/en-us/HT213762
reference_id HT213762
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213762
11
reference_url https://support.apple.com/en-us/HT213764
reference_id HT213764
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213764
12
reference_url https://support.apple.com/en-us/HT213765
reference_id HT213765
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:25:28Z/
url https://support.apple.com/en-us/HT213765
13
reference_url https://access.redhat.com/errata/RHSA-2023:3432
reference_id RHSA-2023:3432
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3432
14
reference_url https://access.redhat.com/errata/RHSA-2023:3433
reference_id RHSA-2023:3433
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:3433
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
aliases CVE-2023-32373
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5334-8qf3-tqbp
32
url VCID-53ct-99rf-sydt
vulnerability_id VCID-53ct-99rf-sydt
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42843.json
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42843
reference_id
reference_type
scores
0
value 0.00063
scoring_system epss
scoring_elements 0.19868
published_at 2026-04-02T12:55:00Z
1
value 0.00095
scoring_system epss
scoring_elements 0.26538
published_at 2026-04-04T12:55:00Z
2
value 0.00098
scoring_system epss
scoring_elements 0.26908
published_at 2026-04-08T12:55:00Z
3
value 0.00098
scoring_system epss
scoring_elements 0.26839
published_at 2026-04-07T12:55:00Z
4
value 0.001
scoring_system epss
scoring_elements 0.27689
published_at 2026-04-13T12:55:00Z
5
value 0.001
scoring_system epss
scoring_elements 0.2779
published_at 2026-04-11T12:55:00Z
6
value 0.001
scoring_system epss
scoring_elements 0.27748
published_at 2026-04-12T12:55:00Z
7
value 0.00131
scoring_system epss
scoring_elements 0.32648
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271717
reference_id 2271717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271717
14
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
15
reference_url https://support.apple.com/en-us/HT213981
reference_id HT213981
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213981
16
reference_url https://support.apple.com/en-us/HT213982
reference_id HT213982
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213982
17
reference_url https://support.apple.com/en-us/HT213984
reference_id HT213984
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213984
18
reference_url https://support.apple.com/en-us/HT213986
reference_id HT213986
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://support.apple.com/en-us/HT213986
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-04T16:39:32Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
20
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
aliases CVE-2023-42843
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-53ct-99rf-sydt
33
url VCID-55jm-2a6c-8fah
vulnerability_id VCID-55jm-2a6c-8fah
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13584.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13584.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13584
reference_id
reference_type
scores
0
value 0.01162
scoring_system epss
scoring_elements 0.78551
published_at 2026-04-01T12:55:00Z
1
value 0.01162
scoring_system epss
scoring_elements 0.78601
published_at 2026-04-13T12:55:00Z
2
value 0.01162
scoring_system epss
scoring_elements 0.78627
published_at 2026-04-11T12:55:00Z
3
value 0.01162
scoring_system epss
scoring_elements 0.78609
published_at 2026-04-12T12:55:00Z
4
value 0.01162
scoring_system epss
scoring_elements 0.78557
published_at 2026-04-02T12:55:00Z
5
value 0.01162
scoring_system epss
scoring_elements 0.78588
published_at 2026-04-04T12:55:00Z
6
value 0.01162
scoring_system epss
scoring_elements 0.7857
published_at 2026-04-07T12:55:00Z
7
value 0.01162
scoring_system epss
scoring_elements 0.78597
published_at 2026-04-08T12:55:00Z
8
value 0.01162
scoring_system epss
scoring_elements 0.78603
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13584
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901212
reference_id 1901212
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901212
15
reference_url https://security.archlinux.org/ASA-202011-28
reference_id ASA-202011-28
reference_type
scores
url https://security.archlinux.org/ASA-202011-28
16
reference_url https://security.archlinux.org/AVG-1291
reference_id AVG-1291
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1291
17
reference_url https://security.gentoo.org/glsa/202012-10
reference_id GLSA-202012-10
reference_type
scores
url https://security.gentoo.org/glsa/202012-10
18
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2020-13584
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-55jm-2a6c-8fah
34
url VCID-5828-4rwa-tkcg
vulnerability_id VCID-5828-4rwa-tkcg
summary webkitgtk: logic issue was addressed with improved state management
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22637.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22637.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22637
reference_id
reference_type
scores
0
value 0.00239
scoring_system epss
scoring_elements 0.46962
published_at 2026-04-13T12:55:00Z
1
value 0.00239
scoring_system epss
scoring_elements 0.46941
published_at 2026-04-02T12:55:00Z
2
value 0.00239
scoring_system epss
scoring_elements 0.46958
published_at 2026-04-04T12:55:00Z
3
value 0.00239
scoring_system epss
scoring_elements 0.46905
published_at 2026-04-07T12:55:00Z
4
value 0.00239
scoring_system epss
scoring_elements 0.4696
published_at 2026-04-08T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.46957
published_at 2026-04-09T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46981
published_at 2026-04-11T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46955
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22637
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073903
reference_id 2073903
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073903
13
reference_url https://security.archlinux.org/AVG-2703
reference_id AVG-2703
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2703
14
reference_url https://support.apple.com/en-us/HT213182
reference_id HT213182
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213182
15
reference_url https://support.apple.com/en-us/HT213186
reference_id HT213186
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213186
16
reference_url https://support.apple.com/en-us/HT213187
reference_id HT213187
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213187
17
reference_url https://support.apple.com/en-us/HT213193
reference_id HT213193
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:51:39Z/
url https://support.apple.com/en-us/HT213193
18
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/5394-1/
reference_id USN-5394-1
reference_type
scores
url https://usn.ubuntu.com/5394-1/
fixed_packages
aliases CVE-2022-22637
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5828-4rwa-tkcg
35
url VCID-586h-px4g-77ab
vulnerability_id VCID-586h-px4g-77ab
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23529.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23529.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23529
reference_id
reference_type
scores
0
value 0.00093
scoring_system epss
scoring_elements 0.26122
published_at 2026-04-02T12:55:00Z
1
value 0.00093
scoring_system epss
scoring_elements 0.25956
published_at 2026-04-13T12:55:00Z
2
value 0.00093
scoring_system epss
scoring_elements 0.26163
published_at 2026-04-04T12:55:00Z
3
value 0.00093
scoring_system epss
scoring_elements 0.25932
published_at 2026-04-07T12:55:00Z
4
value 0.00093
scoring_system epss
scoring_elements 0.26
published_at 2026-04-08T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.26051
published_at 2026-04-09T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.26061
published_at 2026-04-11T12:55:00Z
7
value 0.00093
scoring_system epss
scoring_elements 0.26015
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23529
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23529
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23529
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2169934
reference_id 2169934
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2169934
5
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
6
reference_url https://support.apple.com/en-us/HT213633
reference_id HT213633
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/
url https://support.apple.com/en-us/HT213633
7
reference_url https://support.apple.com/en-us/HT213635
reference_id HT213635
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/
url https://support.apple.com/en-us/HT213635
8
reference_url https://support.apple.com/en-us/HT213638
reference_id HT213638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/
url https://support.apple.com/en-us/HT213638
9
reference_url https://support.apple.com/en-us/HT213673
reference_id HT213673
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:21:43Z/
url https://support.apple.com/en-us/HT213673
10
reference_url https://access.redhat.com/errata/RHSA-2023:0902
reference_id RHSA-2023:0902
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0902
11
reference_url https://access.redhat.com/errata/RHSA-2023:0903
reference_id RHSA-2023:0903
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:0903
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://usn.ubuntu.com/5893-1/
reference_id USN-5893-1
reference_type
scores
url https://usn.ubuntu.com/5893-1/
fixed_packages
aliases CVE-2023-23529
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-586h-px4g-77ab
36
url VCID-5cwk-td7w-3uem
vulnerability_id VCID-5cwk-td7w-3uem
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30851.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30851.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30851
reference_id
reference_type
scores
0
value 0.01034
scoring_system epss
scoring_elements 0.77308
published_at 2026-04-01T12:55:00Z
1
value 0.01034
scoring_system epss
scoring_elements 0.77366
published_at 2026-04-13T12:55:00Z
2
value 0.01034
scoring_system epss
scoring_elements 0.77363
published_at 2026-04-09T12:55:00Z
3
value 0.01034
scoring_system epss
scoring_elements 0.7739
published_at 2026-04-11T12:55:00Z
4
value 0.01034
scoring_system epss
scoring_elements 0.77369
published_at 2026-04-12T12:55:00Z
5
value 0.01034
scoring_system epss
scoring_elements 0.77315
published_at 2026-04-02T12:55:00Z
6
value 0.01034
scoring_system epss
scoring_elements 0.77343
published_at 2026-04-04T12:55:00Z
7
value 0.01034
scoring_system epss
scoring_elements 0.77323
published_at 2026-04-07T12:55:00Z
8
value 0.01034
scoring_system epss
scoring_elements 0.77354
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30851
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2018573
reference_id 2018573
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2018573
14
reference_url https://security.archlinux.org/ASA-202110-10
reference_id ASA-202110-10
reference_type
scores
url https://security.archlinux.org/ASA-202110-10
15
reference_url https://security.archlinux.org/ASA-202110-9
reference_id ASA-202110-9
reference_type
scores
url https://security.archlinux.org/ASA-202110-9
16
reference_url https://security.archlinux.org/AVG-2483
reference_id AVG-2483
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2483
17
reference_url https://security.archlinux.org/AVG-2484
reference_id AVG-2484
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2484
18
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
19
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/5127-1/
reference_id USN-5127-1
reference_type
scores
url https://usn.ubuntu.com/5127-1/
fixed_packages
aliases CVE-2021-30851
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5cwk-td7w-3uem
37
url VCID-5x1k-uam9-5bhs
vulnerability_id VCID-5x1k-uam9-5bhs
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24162.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24162
reference_id
reference_type
scores
0
value 0.01179
scoring_system epss
scoring_elements 0.78697
published_at 2026-04-02T12:55:00Z
1
value 0.01179
scoring_system epss
scoring_elements 0.78741
published_at 2026-04-13T12:55:00Z
2
value 0.01179
scoring_system epss
scoring_elements 0.78728
published_at 2026-04-04T12:55:00Z
3
value 0.01179
scoring_system epss
scoring_elements 0.7871
published_at 2026-04-07T12:55:00Z
4
value 0.01179
scoring_system epss
scoring_elements 0.78735
published_at 2026-04-08T12:55:00Z
5
value 0.01179
scoring_system epss
scoring_elements 0.78742
published_at 2026-04-09T12:55:00Z
6
value 0.01179
scoring_system epss
scoring_elements 0.78766
published_at 2026-04-11T12:55:00Z
7
value 0.01179
scoring_system epss
scoring_elements 0.78749
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24162
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24162
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122071
reference_id 122071
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122071
7
reference_url https://support.apple.com/en-us/122072
reference_id 122072
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122072
8
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122073
9
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-01-28T15:31:32Z/
url https://support.apple.com/en-us/122074
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344624
reference_id 2344624
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344624
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://access.redhat.com/errata/RHSA-2025:1957
reference_id RHSA-2025:1957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1957
13
reference_url https://access.redhat.com/errata/RHSA-2025:1958
reference_id RHSA-2025:1958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1958
14
reference_url https://access.redhat.com/errata/RHSA-2025:1959
reference_id RHSA-2025:1959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1959
15
reference_url https://access.redhat.com/errata/RHSA-2025:1960
reference_id RHSA-2025:1960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1960
16
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
17
reference_url https://access.redhat.com/errata/RHSA-2025:2035
reference_id RHSA-2025:2035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2035
18
reference_url https://access.redhat.com/errata/RHSA-2025:2121
reference_id RHSA-2025:2121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2121
19
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
20
reference_url https://access.redhat.com/errata/RHSA-2025:2126
reference_id RHSA-2025:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2126
21
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
aliases CVE-2025-24162
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-5x1k-uam9-5bhs
38
url VCID-65np-zp25-2yez
vulnerability_id VCID-65np-zp25-2yez
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9948.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9948.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9948
reference_id
reference_type
scores
0
value 0.00294
scoring_system epss
scoring_elements 0.52648
published_at 2026-04-01T12:55:00Z
1
value 0.00294
scoring_system epss
scoring_elements 0.52747
published_at 2026-04-13T12:55:00Z
2
value 0.00294
scoring_system epss
scoring_elements 0.52779
published_at 2026-04-11T12:55:00Z
3
value 0.00294
scoring_system epss
scoring_elements 0.52763
published_at 2026-04-12T12:55:00Z
4
value 0.00294
scoring_system epss
scoring_elements 0.52692
published_at 2026-04-02T12:55:00Z
5
value 0.00294
scoring_system epss
scoring_elements 0.52719
published_at 2026-04-04T12:55:00Z
6
value 0.00294
scoring_system epss
scoring_elements 0.52684
published_at 2026-04-07T12:55:00Z
7
value 0.00294
scoring_system epss
scoring_elements 0.52735
published_at 2026-04-08T12:55:00Z
8
value 0.00294
scoring_system epss
scoring_elements 0.52729
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9948
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901214
reference_id 1901214
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901214
15
reference_url https://security.archlinux.org/AVG-1293
reference_id AVG-1293
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1293
16
reference_url https://security.gentoo.org/glsa/202012-10
reference_id GLSA-202012-10
reference_type
scores
url https://security.gentoo.org/glsa/202012-10
17
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/4648-1/
reference_id USN-4648-1
reference_type
scores
url https://usn.ubuntu.com/4648-1/
fixed_packages
aliases CVE-2020-9948
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-65np-zp25-2yez
39
url VCID-67jq-85hp-hkez
vulnerability_id VCID-67jq-85hp-hkez
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9807.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9807.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9807
reference_id
reference_type
scores
0
value 0.00229
scoring_system epss
scoring_elements 0.45618
published_at 2026-04-01T12:55:00Z
1
value 0.00229
scoring_system epss
scoring_elements 0.45706
published_at 2026-04-13T12:55:00Z
2
value 0.00229
scoring_system epss
scoring_elements 0.45727
published_at 2026-04-11T12:55:00Z
3
value 0.00229
scoring_system epss
scoring_elements 0.45697
published_at 2026-04-12T12:55:00Z
4
value 0.00229
scoring_system epss
scoring_elements 0.45685
published_at 2026-04-02T12:55:00Z
5
value 0.00229
scoring_system epss
scoring_elements 0.45704
published_at 2026-04-09T12:55:00Z
6
value 0.00229
scoring_system epss
scoring_elements 0.45652
published_at 2026-04-07T12:55:00Z
7
value 0.00229
scoring_system epss
scoring_elements 0.45708
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9807
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879564
reference_id 1879564
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879564
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
aliases CVE-2020-9807
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-67jq-85hp-hkez
40
url VCID-67td-2hu4-eqdp
vulnerability_id VCID-67td-2hu4-eqdp
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30799.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30799
reference_id
reference_type
scores
0
value 0.01008
scoring_system epss
scoring_elements 0.77006
published_at 2026-04-01T12:55:00Z
1
value 0.01008
scoring_system epss
scoring_elements 0.77067
published_at 2026-04-13T12:55:00Z
2
value 0.01008
scoring_system epss
scoring_elements 0.77092
published_at 2026-04-11T12:55:00Z
3
value 0.01008
scoring_system epss
scoring_elements 0.77072
published_at 2026-04-12T12:55:00Z
4
value 0.01008
scoring_system epss
scoring_elements 0.77012
published_at 2026-04-02T12:55:00Z
5
value 0.01008
scoring_system epss
scoring_elements 0.77041
published_at 2026-04-04T12:55:00Z
6
value 0.01008
scoring_system epss
scoring_elements 0.77021
published_at 2026-04-07T12:55:00Z
7
value 0.01008
scoring_system epss
scoring_elements 0.77053
published_at 2026-04-08T12:55:00Z
8
value 0.01008
scoring_system epss
scoring_elements 0.77064
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986906
reference_id 1986906
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986906
16
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
17
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
18
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
19
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
20
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
21
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30799
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-67td-2hu4-eqdp
41
url VCID-68gk-5ng7-17d9
vulnerability_id VCID-68gk-5ng7-17d9
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42867.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42867.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42867
reference_id
reference_type
scores
0
value 0.05716
scoring_system epss
scoring_elements 0.90392
published_at 2026-04-02T12:55:00Z
1
value 0.05716
scoring_system epss
scoring_elements 0.90436
published_at 2026-04-12T12:55:00Z
2
value 0.05716
scoring_system epss
scoring_elements 0.90404
published_at 2026-04-04T12:55:00Z
3
value 0.05716
scoring_system epss
scoring_elements 0.90408
published_at 2026-04-07T12:55:00Z
4
value 0.05716
scoring_system epss
scoring_elements 0.90422
published_at 2026-04-08T12:55:00Z
5
value 0.05716
scoring_system epss
scoring_elements 0.90429
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42867
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://www.openwall.com/lists/oss-security/2022/12/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://www.openwall.com/lists/oss-security/2022/12/26/1
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156989
reference_id 2156989
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156989
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
15
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
16
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://security.gentoo.org/glsa/202305-32
17
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213530
18
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213532
19
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213535
20
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213536
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:42:36Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
23
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-42867
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-68gk-5ng7-17d9
42
url VCID-6dgz-w5ga-abb5
vulnerability_id VCID-6dgz-w5ga-abb5
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22677.json
reference_id
reference_type
scores
0
value 3.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22677.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22677
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39763
published_at 2026-04-04T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.3975
published_at 2026-04-09T12:55:00Z
2
value 0.00181
scoring_system epss
scoring_elements 0.39736
published_at 2026-04-08T12:55:00Z
3
value 0.00181
scoring_system epss
scoring_elements 0.39741
published_at 2026-04-02T12:55:00Z
4
value 0.00181
scoring_system epss
scoring_elements 0.39681
published_at 2026-04-07T12:55:00Z
5
value 0.00204
scoring_system epss
scoring_elements 0.42593
published_at 2026-04-13T12:55:00Z
6
value 0.00204
scoring_system epss
scoring_elements 0.42658
published_at 2026-04-11T12:55:00Z
7
value 0.00204
scoring_system epss
scoring_elements 0.42622
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22677
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2104788
reference_id 2104788
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2104788
6
reference_url https://security.archlinux.org/AVG-2779
reference_id AVG-2779
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2779
7
reference_url https://security.archlinux.org/AVG-2780
reference_id AVG-2780
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2780
8
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
9
reference_url https://support.apple.com/en-us/HT213257
reference_id HT213257
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T19:09:48Z/
url https://support.apple.com/en-us/HT213257
10
reference_url https://support.apple.com/en-us/HT213258
reference_id HT213258
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T19:09:48Z/
url https://support.apple.com/en-us/HT213258
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://usn.ubuntu.com/5522-1/
reference_id USN-5522-1
reference_type
scores
url https://usn.ubuntu.com/5522-1/
fixed_packages
aliases CVE-2022-22677
risk_score 1.5
exploitability 0.5
weighted_severity 3.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6dgz-w5ga-abb5
43
url VCID-6t3m-f99z-1kf6
vulnerability_id VCID-6t3m-f99z-1kf6
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23518.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23518
reference_id
reference_type
scores
0
value 0.00311
scoring_system epss
scoring_elements 0.54207
published_at 2026-04-02T12:55:00Z
1
value 0.00311
scoring_system epss
scoring_elements 0.54271
published_at 2026-04-13T12:55:00Z
2
value 0.00311
scoring_system epss
scoring_elements 0.54238
published_at 2026-04-04T12:55:00Z
3
value 0.00311
scoring_system epss
scoring_elements 0.54213
published_at 2026-04-07T12:55:00Z
4
value 0.00311
scoring_system epss
scoring_elements 0.54265
published_at 2026-04-08T12:55:00Z
5
value 0.00311
scoring_system epss
scoring_elements 0.54261
published_at 2026-04-09T12:55:00Z
6
value 0.00311
scoring_system epss
scoring_elements 0.5431
published_at 2026-04-11T12:55:00Z
7
value 0.00311
scoring_system epss
scoring_elements 0.54292
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23518
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167715
reference_id 2167715
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167715
10
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
11
reference_url https://support.apple.com/en-us/HT213599
reference_id HT213599
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213599
12
reference_url https://support.apple.com/en-us/HT213600
reference_id HT213600
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213600
13
reference_url https://support.apple.com/en-us/HT213601
reference_id HT213601
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213601
14
reference_url https://support.apple.com/en-us/HT213603
reference_id HT213603
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213603
15
reference_url https://support.apple.com/en-us/HT213604
reference_id HT213604
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213604
16
reference_url https://support.apple.com/en-us/HT213605
reference_id HT213605
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213605
17
reference_url https://support.apple.com/en-us/HT213606
reference_id HT213606
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213606
18
reference_url https://support.apple.com/en-us/HT213638
reference_id HT213638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:32:37Z/
url https://support.apple.com/en-us/HT213638
19
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
20
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/5867-1/
reference_id USN-5867-1
reference_type
scores
url https://usn.ubuntu.com/5867-1/
fixed_packages
aliases CVE-2023-23518
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6t3m-f99z-1kf6
44
url VCID-6tnz-34ve-ckds
vulnerability_id VCID-6tnz-34ve-ckds
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22628.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22628.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22628
reference_id
reference_type
scores
0
value 0.00211
scoring_system epss
scoring_elements 0.43586
published_at 2026-04-13T12:55:00Z
1
value 0.00211
scoring_system epss
scoring_elements 0.43596
published_at 2026-04-02T12:55:00Z
2
value 0.00211
scoring_system epss
scoring_elements 0.43622
published_at 2026-04-04T12:55:00Z
3
value 0.00211
scoring_system epss
scoring_elements 0.43559
published_at 2026-04-07T12:55:00Z
4
value 0.00211
scoring_system epss
scoring_elements 0.4361
published_at 2026-04-08T12:55:00Z
5
value 0.00211
scoring_system epss
scoring_elements 0.43615
published_at 2026-04-09T12:55:00Z
6
value 0.00211
scoring_system epss
scoring_elements 0.43633
published_at 2026-04-11T12:55:00Z
7
value 0.00211
scoring_system epss
scoring_elements 0.43602
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22628
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073896
reference_id 2073896
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073896
8
reference_url https://security.archlinux.org/AVG-2703
reference_id AVG-2703
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2703
9
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
10
reference_url https://support.apple.com/en-us/HT213182
reference_id HT213182
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/
url https://support.apple.com/en-us/HT213182
11
reference_url https://support.apple.com/en-us/HT213186
reference_id HT213186
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/
url https://support.apple.com/en-us/HT213186
12
reference_url https://support.apple.com/en-us/HT213187
reference_id HT213187
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/
url https://support.apple.com/en-us/HT213187
13
reference_url https://support.apple.com/en-us/HT213193
reference_id HT213193
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T15:19:44Z/
url https://support.apple.com/en-us/HT213193
14
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
15
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/5394-1/
reference_id USN-5394-1
reference_type
scores
url https://usn.ubuntu.com/5394-1/
fixed_packages
aliases CVE-2022-22628
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6tnz-34ve-ckds
45
url VCID-6uck-ed5x-fyga
vulnerability_id VCID-6uck-ed5x-fyga
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38599.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38599
reference_id
reference_type
scores
0
value 0.00435
scoring_system epss
scoring_elements 0.62864
published_at 2026-04-13T12:55:00Z
1
value 0.00435
scoring_system epss
scoring_elements 0.62897
published_at 2026-04-11T12:55:00Z
2
value 0.00435
scoring_system epss
scoring_elements 0.62886
published_at 2026-04-12T12:55:00Z
3
value 0.00543
scoring_system epss
scoring_elements 0.67723
published_at 2026-04-08T12:55:00Z
4
value 0.00543
scoring_system epss
scoring_elements 0.67737
published_at 2026-04-09T12:55:00Z
5
value 0.00543
scoring_system epss
scoring_elements 0.6767
published_at 2026-04-02T12:55:00Z
6
value 0.00543
scoring_system epss
scoring_elements 0.67691
published_at 2026-04-04T12:55:00Z
7
value 0.00543
scoring_system epss
scoring_elements 0.67671
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38599
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231020
reference_id 2231020
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231020
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38599
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6uck-ed5x-fyga
46
url VCID-6xkn-7q6s-5fey
vulnerability_id VCID-6xkn-7q6s-5fey
summary webkit: pointer authentication bypass
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27834.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27834
reference_id
reference_type
scores
0
value 8e-05
scoring_system epss
scoring_elements 0.00773
published_at 2026-04-13T12:55:00Z
1
value 8e-05
scoring_system epss
scoring_elements 0.00772
published_at 2026-04-12T12:55:00Z
2
value 8e-05
scoring_system epss
scoring_elements 0.00701
published_at 2026-04-07T12:55:00Z
3
value 8e-05
scoring_system epss
scoring_elements 0.00778
published_at 2026-04-11T12:55:00Z
4
value 8e-05
scoring_system epss
scoring_elements 0.00784
published_at 2026-04-09T12:55:00Z
5
value 8e-05
scoring_system epss
scoring_elements 0.00788
published_at 2026-04-08T12:55:00Z
6
value 8e-05
scoring_system epss
scoring_elements 0.00697
published_at 2026-04-04T12:55:00Z
7
value 8e-05
scoring_system epss
scoring_elements 0.00702
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27834
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://www.openwall.com/lists/oss-security/2024/05/21/1
reference_id 1
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://www.openwall.com/lists/oss-security/2024/05/21/1
8
reference_url http://seclists.org/fulldisclosure/2024/May/10
reference_id 10
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/10
9
reference_url http://seclists.org/fulldisclosure/2024/May/12
reference_id 12
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/12
10
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120896
11
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120898
12
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120901
13
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120902
14
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120903
15
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/120905
16
reference_url http://seclists.org/fulldisclosure/2024/May/16
reference_id 16
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/16
17
reference_url http://seclists.org/fulldisclosure/2024/May/17
reference_id 17
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/17
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2282412
reference_id 2282412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2282412
19
reference_url http://seclists.org/fulldisclosure/2024/May/9
reference_id 9
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url http://seclists.org/fulldisclosure/2024/May/9
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/
reference_id ADCLQW54XN37VJZNYD3UKCYATJFIMYXG
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ADCLQW54XN37VJZNYD3UKCYATJFIMYXG/
21
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214101
22
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214102
23
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214103
24
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214104
25
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://support.apple.com/en-us/HT214106
26
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
27
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
28
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
30
reference_url https://usn.ubuntu.com/6788-1/
reference_id USN-6788-1
reference_type
scores
url https://usn.ubuntu.com/6788-1/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/
reference_id WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-05-16T04:00:11Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WKIXADCW3O4R2OOSDZGPU55XQFE6NA3M/
fixed_packages
aliases CVE-2024-27834
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6xkn-7q6s-5fey
47
url VCID-71d6-g16a-3qa9
vulnerability_id VCID-71d6-g16a-3qa9
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38133.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38133
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.56109
published_at 2026-04-02T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.56129
published_at 2026-04-04T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.56108
published_at 2026-04-07T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56159
published_at 2026-04-08T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.56164
published_at 2026-04-09T12:55:00Z
5
value 0.00399
scoring_system epss
scoring_elements 0.60655
published_at 2026-04-13T12:55:00Z
6
value 0.00399
scoring_system epss
scoring_elements 0.6069
published_at 2026-04-11T12:55:00Z
7
value 0.00399
scoring_system epss
scoring_elements 0.60675
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38133
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231015
reference_id 2231015
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231015
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38133
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-71d6-g16a-3qa9
48
url VCID-7cef-namz-wkec
vulnerability_id VCID-7cef-namz-wkec
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30758.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30758.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30758
reference_id
reference_type
scores
0
value 0.00346
scoring_system epss
scoring_elements 0.5702
published_at 2026-04-01T12:55:00Z
1
value 0.00346
scoring_system epss
scoring_elements 0.57157
published_at 2026-04-12T12:55:00Z
2
value 0.00346
scoring_system epss
scoring_elements 0.57166
published_at 2026-04-09T12:55:00Z
3
value 0.00346
scoring_system epss
scoring_elements 0.57178
published_at 2026-04-11T12:55:00Z
4
value 0.00346
scoring_system epss
scoring_elements 0.57115
published_at 2026-04-02T12:55:00Z
5
value 0.00346
scoring_system epss
scoring_elements 0.57137
published_at 2026-04-13T12:55:00Z
6
value 0.00346
scoring_system epss
scoring_elements 0.57113
published_at 2026-04-07T12:55:00Z
7
value 0.00346
scoring_system epss
scoring_elements 0.57164
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30758
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986892
reference_id 1986892
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986892
16
reference_url https://security.archlinux.org/AVG-2218
reference_id AVG-2218
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2218
17
reference_url https://security.archlinux.org/AVG-2219
reference_id AVG-2219
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2219
18
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
19
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30758
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7cef-namz-wkec
49
url VCID-7ehr-3myw-g7b1
vulnerability_id VCID-7ehr-3myw-g7b1
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42917.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42917
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.20853
published_at 2026-04-13T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.2102
published_at 2026-04-02T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.20906
published_at 2026-04-12T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.20949
published_at 2026-04-11T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.20933
published_at 2026-04-09T12:55:00Z
5
value 0.00068
scoring_system epss
scoring_elements 0.20792
published_at 2026-04-07T12:55:00Z
6
value 0.00068
scoring_system epss
scoring_elements 0.21076
published_at 2026-04-04T12:55:00Z
7
value 0.00068
scoring_system epss
scoring_elements 0.20872
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42917
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/12/05/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://www.openwall.com/lists/oss-security/2023/12/05/1
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
7
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253058
reference_id 2253058
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253058
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/3
10
reference_url http://seclists.org/fulldisclosure/2024/Jan/35
reference_id 35
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2024/Jan/35
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/4
12
reference_url http://seclists.org/fulldisclosure/2023/Dec/5
reference_id 5
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/5
13
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
reference_id AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
15
reference_url https://www.debian.org/security/2023/dsa-5575
reference_id dsa-5575
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://www.debian.org/security/2023/dsa-5575
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://support.apple.com/en-us/HT214031
reference_id HT214031
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214031
18
reference_url https://support.apple.com/en-us/HT214032
reference_id HT214032
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214032
19
reference_url https://support.apple.com/en-us/HT214033
reference_id HT214033
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/en-us/HT214033
20
reference_url https://support.apple.com/kb/HT214033
reference_id HT214033
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214033
21
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214034
22
reference_url https://support.apple.com/kb/HT214062
reference_id HT214062
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://support.apple.com/kb/HT214062
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
reference_id P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2023-12-02T05:00:19Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
24
reference_url https://access.redhat.com/errata/RHSA-2023:7715
reference_id RHSA-2023:7715
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7715
25
reference_url https://access.redhat.com/errata/RHSA-2023:7716
reference_id RHSA-2023:7716
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7716
26
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
27
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
31
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
32
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
33
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6545-1/
reference_id USN-6545-1
reference_type
scores
url https://usn.ubuntu.com/6545-1/
fixed_packages
aliases CVE-2023-42917
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ehr-3myw-g7b1
50
url VCID-7gbc-786y-hyc8
vulnerability_id VCID-7gbc-786y-hyc8
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21779.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21779
reference_id
reference_type
scores
0
value 0.00508
scoring_system epss
scoring_elements 0.66233
published_at 2026-04-01T12:55:00Z
1
value 0.00508
scoring_system epss
scoring_elements 0.66306
published_at 2026-04-13T12:55:00Z
2
value 0.00508
scoring_system epss
scoring_elements 0.6633
published_at 2026-04-09T12:55:00Z
3
value 0.00508
scoring_system epss
scoring_elements 0.6635
published_at 2026-04-11T12:55:00Z
4
value 0.00508
scoring_system epss
scoring_elements 0.66337
published_at 2026-04-12T12:55:00Z
5
value 0.00508
scoring_system epss
scoring_elements 0.66273
published_at 2026-04-02T12:55:00Z
6
value 0.00508
scoring_system epss
scoring_elements 0.66299
published_at 2026-04-04T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66269
published_at 2026-04-07T12:55:00Z
8
value 0.00508
scoring_system epss
scoring_elements 0.66317
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21779
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986866
reference_id 1986866
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986866
17
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
18
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
19
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
20
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
21
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
22
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-21779
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gbc-786y-hyc8
51
url VCID-7gyr-mvmk-pfh9
vulnerability_id VCID-7gyr-mvmk-pfh9
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54467.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54467
reference_id
reference_type
scores
0
value 0.00187
scoring_system epss
scoring_elements 0.40598
published_at 2026-04-08T12:55:00Z
1
value 0.00187
scoring_system epss
scoring_elements 0.40626
published_at 2026-04-11T12:55:00Z
2
value 0.00187
scoring_system epss
scoring_elements 0.40607
published_at 2026-04-09T12:55:00Z
3
value 0.00187
scoring_system epss
scoring_elements 0.40547
published_at 2026-04-07T12:55:00Z
4
value 0.00187
scoring_system epss
scoring_elements 0.40625
published_at 2026-04-04T12:55:00Z
5
value 0.00208
scoring_system epss
scoring_elements 0.43206
published_at 2026-04-13T12:55:00Z
6
value 0.00208
scoring_system epss
scoring_elements 0.43221
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54467
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54467
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T02:34:06Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353872
reference_id 2353872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353872
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
20
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
21
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
22
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
23
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
aliases CVE-2024-54467
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7gyr-mvmk-pfh9
52
url VCID-7hva-brss-wkhr
vulnerability_id VCID-7hva-brss-wkhr
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9925.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9925.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9925
reference_id
reference_type
scores
0
value 0.00811
scoring_system epss
scoring_elements 0.74178
published_at 2026-04-01T12:55:00Z
1
value 0.00811
scoring_system epss
scoring_elements 0.74183
published_at 2026-04-07T12:55:00Z
2
value 0.00811
scoring_system epss
scoring_elements 0.74211
published_at 2026-04-04T12:55:00Z
3
value 0.00811
scoring_system epss
scoring_elements 0.74216
published_at 2026-04-08T12:55:00Z
4
value 0.00811
scoring_system epss
scoring_elements 0.74231
published_at 2026-04-09T12:55:00Z
5
value 0.00811
scoring_system epss
scoring_elements 0.74252
published_at 2026-04-11T12:55:00Z
6
value 0.00811
scoring_system epss
scoring_elements 0.74234
published_at 2026-04-12T12:55:00Z
7
value 0.00811
scoring_system epss
scoring_elements 0.74227
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9925
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879541
reference_id 1879541
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879541
11
reference_url https://security.gentoo.org/glsa/202007-61
reference_id GLSA-202007-61
reference_type
scores
url https://security.gentoo.org/glsa/202007-61
12
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/4444-1/
reference_id USN-4444-1
reference_type
scores
url https://usn.ubuntu.com/4444-1/
fixed_packages
aliases CVE-2020-9925
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7hva-brss-wkhr
53
url VCID-7ua3-g2sz-ebej
vulnerability_id VCID-7ua3-g2sz-ebej
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9947.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9947.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9947
reference_id
reference_type
scores
0
value 0.00809
scoring_system epss
scoring_elements 0.7416
published_at 2026-04-01T12:55:00Z
1
value 0.00809
scoring_system epss
scoring_elements 0.74208
published_at 2026-04-13T12:55:00Z
2
value 0.00809
scoring_system epss
scoring_elements 0.74234
published_at 2026-04-11T12:55:00Z
3
value 0.00809
scoring_system epss
scoring_elements 0.74216
published_at 2026-04-12T12:55:00Z
4
value 0.00809
scoring_system epss
scoring_elements 0.74165
published_at 2026-04-02T12:55:00Z
5
value 0.00809
scoring_system epss
scoring_elements 0.74192
published_at 2026-04-04T12:55:00Z
6
value 0.00809
scoring_system epss
scoring_elements 0.74164
published_at 2026-04-07T12:55:00Z
7
value 0.00809
scoring_system epss
scoring_elements 0.74197
published_at 2026-04-08T12:55:00Z
8
value 0.00809
scoring_system epss
scoring_elements 0.74212
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9947
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944331
reference_id 1944331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944331
15
reference_url https://security.archlinux.org/AVG-1723
reference_id AVG-1723
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1723
16
reference_url https://security.gentoo.org/glsa/202104-03
reference_id GLSA-202104-03
reference_type
scores
url https://security.gentoo.org/glsa/202104-03
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2020-9947
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-7ua3-g2sz-ebej
54
url VCID-82hd-28j1-xyev
vulnerability_id VCID-82hd-28j1-xyev
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9805.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9805.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9805
reference_id
reference_type
scores
0
value 0.00866
scoring_system epss
scoring_elements 0.75081
published_at 2026-04-01T12:55:00Z
1
value 0.00866
scoring_system epss
scoring_elements 0.75135
published_at 2026-04-12T12:55:00Z
2
value 0.00866
scoring_system epss
scoring_elements 0.75136
published_at 2026-04-09T12:55:00Z
3
value 0.00866
scoring_system epss
scoring_elements 0.75157
published_at 2026-04-11T12:55:00Z
4
value 0.00866
scoring_system epss
scoring_elements 0.75083
published_at 2026-04-02T12:55:00Z
5
value 0.00866
scoring_system epss
scoring_elements 0.75112
published_at 2026-04-04T12:55:00Z
6
value 0.00866
scoring_system epss
scoring_elements 0.75089
published_at 2026-04-07T12:55:00Z
7
value 0.00866
scoring_system epss
scoring_elements 0.75124
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9805
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879559
reference_id 1879559
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879559
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
aliases CVE-2020-9805
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-82hd-28j1-xyev
55
url VCID-835v-4yds-ebem
vulnerability_id VCID-835v-4yds-ebem
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30749.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30749.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30749
reference_id
reference_type
scores
0
value 0.01256
scoring_system epss
scoring_elements 0.79327
published_at 2026-04-01T12:55:00Z
1
value 0.01256
scoring_system epss
scoring_elements 0.79375
published_at 2026-04-13T12:55:00Z
2
value 0.01256
scoring_system epss
scoring_elements 0.79378
published_at 2026-04-09T12:55:00Z
3
value 0.01256
scoring_system epss
scoring_elements 0.79401
published_at 2026-04-11T12:55:00Z
4
value 0.01256
scoring_system epss
scoring_elements 0.79386
published_at 2026-04-12T12:55:00Z
5
value 0.01256
scoring_system epss
scoring_elements 0.79333
published_at 2026-04-02T12:55:00Z
6
value 0.01256
scoring_system epss
scoring_elements 0.79357
published_at 2026-04-04T12:55:00Z
7
value 0.01256
scoring_system epss
scoring_elements 0.79343
published_at 2026-04-07T12:55:00Z
8
value 0.01256
scoring_system epss
scoring_elements 0.79369
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30749
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986890
reference_id 1986890
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986890
17
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
18
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
19
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
20
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
21
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
22
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30749
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-835v-4yds-ebem
56
url VCID-85na-58dz-53hb
vulnerability_id VCID-85na-58dz-53hb
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27932.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27932.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27932
reference_id
reference_type
scores
0
value 0.00012
scoring_system epss
scoring_elements 0.01744
published_at 2026-04-02T12:55:00Z
1
value 0.00012
scoring_system epss
scoring_elements 0.01753
published_at 2026-04-13T12:55:00Z
2
value 0.00012
scoring_system epss
scoring_elements 0.01758
published_at 2026-04-07T12:55:00Z
3
value 0.00012
scoring_system epss
scoring_elements 0.01761
published_at 2026-04-08T12:55:00Z
4
value 0.00012
scoring_system epss
scoring_elements 0.0177
published_at 2026-04-09T12:55:00Z
5
value 0.00012
scoring_system epss
scoring_elements 0.01765
published_at 2026-04-11T12:55:00Z
6
value 0.00012
scoring_system epss
scoring_elements 0.01755
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27932
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236843
reference_id 2236843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236843
14
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
15
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213670
16
reference_url https://support.apple.com/en-us/HT213671
reference_id HT213671
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213671
17
reference_url https://support.apple.com/en-us/HT213674
reference_id HT213674
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213674
18
reference_url https://support.apple.com/en-us/HT213676
reference_id HT213676
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213676
19
reference_url https://support.apple.com/en-us/HT213678
reference_id HT213678
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T20:17:35Z/
url https://support.apple.com/en-us/HT213678
20
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
21
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2023-27932
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-85na-58dz-53hb
57
url VCID-86rq-d7wp-yyfw
vulnerability_id VCID-86rq-d7wp-yyfw
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9915.json
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9915.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9915
reference_id
reference_type
scores
0
value 0.00775
scoring_system epss
scoring_elements 0.73551
published_at 2026-04-01T12:55:00Z
1
value 0.00775
scoring_system epss
scoring_elements 0.7356
published_at 2026-04-02T12:55:00Z
2
value 0.00775
scoring_system epss
scoring_elements 0.73583
published_at 2026-04-04T12:55:00Z
3
value 0.00775
scoring_system epss
scoring_elements 0.73556
published_at 2026-04-07T12:55:00Z
4
value 0.00775
scoring_system epss
scoring_elements 0.73592
published_at 2026-04-08T12:55:00Z
5
value 0.00775
scoring_system epss
scoring_elements 0.73605
published_at 2026-04-09T12:55:00Z
6
value 0.00775
scoring_system epss
scoring_elements 0.73627
published_at 2026-04-11T12:55:00Z
7
value 0.00775
scoring_system epss
scoring_elements 0.73609
published_at 2026-04-12T12:55:00Z
8
value 0.00775
scoring_system epss
scoring_elements 0.736
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9915
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879540
reference_id 1879540
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879540
11
reference_url https://security.gentoo.org/glsa/202007-61
reference_id GLSA-202007-61
reference_type
scores
url https://security.gentoo.org/glsa/202007-61
12
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/4444-1/
reference_id USN-4444-1
reference_type
scores
url https://usn.ubuntu.com/4444-1/
fixed_packages
aliases CVE-2020-9915
risk_score 2.9
exploitability 0.5
weighted_severity 5.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-86rq-d7wp-yyfw
58
url VCID-8dkk-sgdg-kfhy
vulnerability_id VCID-8dkk-sgdg-kfhy
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1825.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1825.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1825
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.62951
published_at 2026-04-01T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.63051
published_at 2026-04-13T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.63087
published_at 2026-04-11T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63073
published_at 2026-04-12T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63009
published_at 2026-04-02T12:55:00Z
5
value 0.00437
scoring_system epss
scoring_elements 0.63038
published_at 2026-04-04T12:55:00Z
6
value 0.00437
scoring_system epss
scoring_elements 0.63003
published_at 2026-04-07T12:55:00Z
7
value 0.00437
scoring_system epss
scoring_elements 0.63054
published_at 2026-04-08T12:55:00Z
8
value 0.00437
scoring_system epss
scoring_elements 0.63069
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1825
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986858
reference_id 1986858
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986858
14
reference_url https://security.archlinux.org/AVG-2208
reference_id AVG-2208
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2208
15
reference_url https://security.archlinux.org/AVG-2209
reference_id AVG-2209
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2209
16
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
17
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-1825
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8dkk-sgdg-kfhy
59
url VCID-8kh9-phq4-13a3
vulnerability_id VCID-8kh9-phq4-13a3
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30293.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30293.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-30293
reference_id
reference_type
scores
0
value 0.00186
scoring_system epss
scoring_elements 0.40345
published_at 2026-04-13T12:55:00Z
1
value 0.00186
scoring_system epss
scoring_elements 0.40391
published_at 2026-04-09T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40402
published_at 2026-04-11T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40364
published_at 2026-04-12T12:55:00Z
4
value 0.00186
scoring_system epss
scoring_elements 0.40378
published_at 2026-04-02T12:55:00Z
5
value 0.00186
scoring_system epss
scoring_elements 0.40404
published_at 2026-04-04T12:55:00Z
6
value 0.00186
scoring_system epss
scoring_elements 0.40329
published_at 2026-04-07T12:55:00Z
7
value 0.00186
scoring_system epss
scoring_elements 0.4038
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-30293
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082548
reference_id 2082548
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082548
10
reference_url https://security.archlinux.org/AVG-2758
reference_id AVG-2758
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2758
11
reference_url https://security.archlinux.org/AVG-2759
reference_id AVG-2759
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2759
12
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
13
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
14
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-30293
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8kh9-phq4-13a3
60
url VCID-8ncw-zt4k-73ak
vulnerability_id VCID-8ncw-zt4k-73ak
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42956.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42956.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42956
reference_id
reference_type
scores
0
value 0.00302
scoring_system epss
scoring_elements 0.5347
published_at 2026-04-02T12:55:00Z
1
value 0.00302
scoring_system epss
scoring_elements 0.53526
published_at 2026-04-13T12:55:00Z
2
value 0.00302
scoring_system epss
scoring_elements 0.53495
published_at 2026-04-04T12:55:00Z
3
value 0.00302
scoring_system epss
scoring_elements 0.53464
published_at 2026-04-07T12:55:00Z
4
value 0.00302
scoring_system epss
scoring_elements 0.53515
published_at 2026-04-08T12:55:00Z
5
value 0.00302
scoring_system epss
scoring_elements 0.53512
published_at 2026-04-09T12:55:00Z
6
value 0.00302
scoring_system epss
scoring_elements 0.53561
published_at 2026-04-11T12:55:00Z
7
value 0.00302
scoring_system epss
scoring_elements 0.53544
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42956
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271719
reference_id 2271719
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271719
14
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
15
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/en-us/HT214035
16
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/en-us/HT214036
17
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/en-us/HT214039
18
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://support.apple.com/kb/HT214039
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-04-08T17:46:52Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
20
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
aliases CVE-2023-42956
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8ncw-zt4k-73ak
61
url VCID-8trg-392k-3bdh
vulnerability_id VCID-8trg-392k-3bdh
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26700.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26700
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33108
published_at 2026-04-13T12:55:00Z
1
value 0.00134
scoring_system epss
scoring_elements 0.33228
published_at 2026-04-02T12:55:00Z
2
value 0.00134
scoring_system epss
scoring_elements 0.3326
published_at 2026-04-04T12:55:00Z
3
value 0.00134
scoring_system epss
scoring_elements 0.33092
published_at 2026-04-07T12:55:00Z
4
value 0.00134
scoring_system epss
scoring_elements 0.33136
published_at 2026-04-08T12:55:00Z
5
value 0.00134
scoring_system epss
scoring_elements 0.33168
published_at 2026-04-09T12:55:00Z
6
value 0.00134
scoring_system epss
scoring_elements 0.33171
published_at 2026-04-11T12:55:00Z
7
value 0.00134
scoring_system epss
scoring_elements 0.33132
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092732
reference_id 2092732
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092732
10
reference_url https://security.archlinux.org/AVG-2758
reference_id AVG-2758
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2758
11
reference_url https://security.archlinux.org/AVG-2759
reference_id AVG-2759
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2759
12
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
13
reference_url https://support.apple.com/en-us/HT213253
reference_id HT213253
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/
url https://support.apple.com/en-us/HT213253
14
reference_url https://support.apple.com/en-us/HT213254
reference_id HT213254
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/
url https://support.apple.com/en-us/HT213254
15
reference_url https://support.apple.com/en-us/HT213257
reference_id HT213257
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/
url https://support.apple.com/en-us/HT213257
16
reference_url https://support.apple.com/en-us/HT213258
reference_id HT213258
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/
url https://support.apple.com/en-us/HT213258
17
reference_url https://support.apple.com/en-us/HT213260
reference_id HT213260
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:06:57Z/
url https://support.apple.com/en-us/HT213260
18
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
19
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/5457-1/
reference_id USN-5457-1
reference_type
scores
url https://usn.ubuntu.com/5457-1/
fixed_packages
aliases CVE-2022-26700
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8trg-392k-3bdh
62
url VCID-8utu-penp-rbax
vulnerability_id VCID-8utu-penp-rbax
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23280.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23280.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23280
reference_id
reference_type
scores
0
value 0.00513
scoring_system epss
scoring_elements 0.665
published_at 2026-04-02T12:55:00Z
1
value 0.00515
scoring_system epss
scoring_elements 0.66637
published_at 2026-04-12T12:55:00Z
2
value 0.00515
scoring_system epss
scoring_elements 0.6665
published_at 2026-04-11T12:55:00Z
3
value 0.00515
scoring_system epss
scoring_elements 0.66631
published_at 2026-04-09T12:55:00Z
4
value 0.00515
scoring_system epss
scoring_elements 0.6657
published_at 2026-04-07T12:55:00Z
5
value 0.00515
scoring_system epss
scoring_elements 0.66598
published_at 2026-04-04T12:55:00Z
6
value 0.00515
scoring_system epss
scoring_elements 0.66617
published_at 2026-04-08T12:55:00Z
7
value 0.00515
scoring_system epss
scoring_elements 0.66605
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23280
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120881
14
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120882
15
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120893
16
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120894
17
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/120895
18
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
19
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270291
reference_id 2270291
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270291
20
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
21
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
reference_id AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
reference_id BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
24
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
25
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214081
26
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214084
27
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214086
28
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214088
29
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://support.apple.com/en-us/HT214089
30
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
reference_id PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T20:33:30Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
32
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
33
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
aliases CVE-2024-23280
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8utu-penp-rbax
63
url VCID-8y8h-r2c8-hudj
vulnerability_id VCID-8y8h-r2c8-hudj
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30720.json
reference_id
reference_type
scores
0
value 9.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30720.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30720
reference_id
reference_type
scores
0
value 0.00383
scoring_system epss
scoring_elements 0.59508
published_at 2026-04-01T12:55:00Z
1
value 0.00383
scoring_system epss
scoring_elements 0.59623
published_at 2026-04-13T12:55:00Z
2
value 0.00383
scoring_system epss
scoring_elements 0.59659
published_at 2026-04-11T12:55:00Z
3
value 0.00383
scoring_system epss
scoring_elements 0.59642
published_at 2026-04-12T12:55:00Z
4
value 0.00383
scoring_system epss
scoring_elements 0.59581
published_at 2026-04-02T12:55:00Z
5
value 0.00383
scoring_system epss
scoring_elements 0.59606
published_at 2026-04-04T12:55:00Z
6
value 0.00383
scoring_system epss
scoring_elements 0.59576
published_at 2026-04-07T12:55:00Z
7
value 0.00383
scoring_system epss
scoring_elements 0.59627
published_at 2026-04-08T12:55:00Z
8
value 0.00383
scoring_system epss
scoring_elements 0.59639
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30720
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986883
reference_id 1986883
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986883
16
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
17
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
18
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
19
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
20
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
21
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30720
risk_score 4.2
exploitability 0.5
weighted_severity 8.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-8y8h-r2c8-hudj
64
url VCID-933e-5azn-6yec
vulnerability_id VCID-933e-5azn-6yec
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43000.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43000.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43000
reference_id
reference_type
scores
0
value 0.0006
scoring_system epss
scoring_elements 0.18715
published_at 2026-04-13T12:55:00Z
1
value 0.0006
scoring_system epss
scoring_elements 0.18949
published_at 2026-04-04T12:55:00Z
2
value 0.0006
scoring_system epss
scoring_elements 0.18673
published_at 2026-04-07T12:55:00Z
3
value 0.0006
scoring_system epss
scoring_elements 0.18753
published_at 2026-04-08T12:55:00Z
4
value 0.0006
scoring_system epss
scoring_elements 0.18807
published_at 2026-04-09T12:55:00Z
5
value 0.0006
scoring_system epss
scoring_elements 0.18812
published_at 2026-04-11T12:55:00Z
6
value 0.0006
scoring_system epss
scoring_elements 0.18765
published_at 2026-04-12T12:55:00Z
7
value 0.00095
scoring_system epss
scoring_elements 0.26483
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43000
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://support.apple.com/en-us/120324
reference_id 120324
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/
url https://support.apple.com/en-us/120324
14
reference_url https://support.apple.com/en-us/120331
reference_id 120331
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/
url https://support.apple.com/en-us/120331
15
reference_url https://support.apple.com/en-us/120338
reference_id 120338
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/
url https://support.apple.com/en-us/120338
16
reference_url https://support.apple.com/en-us/126632
reference_id 126632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:16:46Z/
url https://support.apple.com/en-us/126632
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416324
reference_id 2416324
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416324
18
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
19
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
20
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
23
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
24
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
25
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-43000
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-933e-5azn-6yec
65
url VCID-96uu-rhdj-ebbq
vulnerability_id VCID-96uu-rhdj-ebbq
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27918.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-27918.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-27918
reference_id
reference_type
scores
0
value 0.00234
scoring_system epss
scoring_elements 0.46183
published_at 2026-04-01T12:55:00Z
1
value 0.00234
scoring_system epss
scoring_elements 0.46254
published_at 2026-04-13T12:55:00Z
2
value 0.00234
scoring_system epss
scoring_elements 0.4625
published_at 2026-04-09T12:55:00Z
3
value 0.00234
scoring_system epss
scoring_elements 0.46273
published_at 2026-04-11T12:55:00Z
4
value 0.00234
scoring_system epss
scoring_elements 0.46245
published_at 2026-04-12T12:55:00Z
5
value 0.00234
scoring_system epss
scoring_elements 0.46225
published_at 2026-04-02T12:55:00Z
6
value 0.00234
scoring_system epss
scoring_elements 0.46244
published_at 2026-04-04T12:55:00Z
7
value 0.00234
scoring_system epss
scoring_elements 0.46192
published_at 2026-04-07T12:55:00Z
8
value 0.00234
scoring_system epss
scoring_elements 0.46248
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-27918
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944323
reference_id 1944323
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944323
12
reference_url https://security.archlinux.org/ASA-202103-24
reference_id ASA-202103-24
reference_type
scores
url https://security.archlinux.org/ASA-202103-24
13
reference_url https://security.archlinux.org/ASA-202103-25
reference_id ASA-202103-25
reference_type
scores
url https://security.archlinux.org/ASA-202103-25
14
reference_url https://security.archlinux.org/AVG-1721
reference_id AVG-1721
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1721
15
reference_url https://security.archlinux.org/AVG-1722
reference_id AVG-1722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1722
16
reference_url https://security.gentoo.org/glsa/202104-03
reference_id GLSA-202104-03
reference_type
scores
url https://security.gentoo.org/glsa/202104-03
17
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/4894-1/
reference_id USN-4894-1
reference_type
scores
url https://usn.ubuntu.com/4894-1/
fixed_packages
aliases CVE-2020-27918
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-96uu-rhdj-ebbq
66
url VCID-9dnz-1f32-gfdp
vulnerability_id VCID-9dnz-1f32-gfdp
summary webkitgtk: A malicious website may exfiltrate data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43480.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-43480.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-43480
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08118
published_at 2026-04-13T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08128
published_at 2026-04-04T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08079
published_at 2026-04-07T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.0814
published_at 2026-04-08T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08162
published_at 2026-04-09T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08154
published_at 2026-04-11T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08135
published_at 2026-04-12T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08458
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-43480
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/125632
reference_id 125632
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125632
5
reference_url https://support.apple.com/en-us/125634
reference_id 125634
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125634
6
reference_url https://support.apple.com/en-us/125637
reference_id 125637
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125637
7
reference_url https://support.apple.com/en-us/125638
reference_id 125638
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125638
8
reference_url https://support.apple.com/en-us/125639
reference_id 125639
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125639
9
reference_url https://support.apple.com/en-us/125640
reference_id 125640
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-11-04T15:32:41Z/
url https://support.apple.com/en-us/125640
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2416338
reference_id 2416338
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2416338
11
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
12
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
13
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
14
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
15
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
16
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
17
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
18
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
19
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2025-43480
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9dnz-1f32-gfdp
67
url VCID-9j6k-np3x-23f7
vulnerability_id VCID-9j6k-np3x-23f7
summary webkit: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54508.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54508
reference_id
reference_type
scores
0
value 0.01383
scoring_system epss
scoring_elements 0.80301
published_at 2026-04-13T12:55:00Z
1
value 0.01383
scoring_system epss
scoring_elements 0.80278
published_at 2026-04-04T12:55:00Z
2
value 0.01383
scoring_system epss
scoring_elements 0.80266
published_at 2026-04-07T12:55:00Z
3
value 0.01383
scoring_system epss
scoring_elements 0.80293
published_at 2026-04-08T12:55:00Z
4
value 0.01383
scoring_system epss
scoring_elements 0.80304
published_at 2026-04-09T12:55:00Z
5
value 0.01383
scoring_system epss
scoring_elements 0.80323
published_at 2026-04-11T12:55:00Z
6
value 0.01383
scoring_system epss
scoring_elements 0.80308
published_at 2026-04-12T12:55:00Z
7
value 0.01438
scoring_system epss
scoring_elements 0.80656
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54508
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54508
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/121846
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-12-16T18:36:10Z/
url https://support.apple.com/en-us/122372
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333845
reference_id 2333845
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333845
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
aliases CVE-2024-54508
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9j6k-np3x-23f7
68
url VCID-9jak-ycxb-bfgx
vulnerability_id VCID-9jak-ycxb-bfgx
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30848.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30848.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30848
reference_id
reference_type
scores
0
value 0.00316
scoring_system epss
scoring_elements 0.54628
published_at 2026-04-01T12:55:00Z
1
value 0.00316
scoring_system epss
scoring_elements 0.54714
published_at 2026-04-13T12:55:00Z
2
value 0.00316
scoring_system epss
scoring_elements 0.54739
published_at 2026-04-09T12:55:00Z
3
value 0.00316
scoring_system epss
scoring_elements 0.54751
published_at 2026-04-11T12:55:00Z
4
value 0.00316
scoring_system epss
scoring_elements 0.54736
published_at 2026-04-12T12:55:00Z
5
value 0.00316
scoring_system epss
scoring_elements 0.54698
published_at 2026-04-02T12:55:00Z
6
value 0.00316
scoring_system epss
scoring_elements 0.54721
published_at 2026-04-04T12:55:00Z
7
value 0.00316
scoring_system epss
scoring_elements 0.54691
published_at 2026-04-07T12:55:00Z
8
value 0.00316
scoring_system epss
scoring_elements 0.54743
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30848
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2017901
reference_id 2017901
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2017901
10
reference_url https://security.archlinux.org/AVG-2399
reference_id AVG-2399
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2399
11
reference_url https://security.archlinux.org/AVG-2400
reference_id AVG-2400
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2400
12
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30848
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9jak-ycxb-bfgx
69
url VCID-9ngd-m4ac-mba1
vulnerability_id VCID-9ngd-m4ac-mba1
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9894.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9894.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9894
reference_id
reference_type
scores
0
value 0.0066
scoring_system epss
scoring_elements 0.71045
published_at 2026-04-01T12:55:00Z
1
value 0.0066
scoring_system epss
scoring_elements 0.71054
published_at 2026-04-02T12:55:00Z
2
value 0.0066
scoring_system epss
scoring_elements 0.71071
published_at 2026-04-04T12:55:00Z
3
value 0.0066
scoring_system epss
scoring_elements 0.71046
published_at 2026-04-07T12:55:00Z
4
value 0.0066
scoring_system epss
scoring_elements 0.71088
published_at 2026-04-08T12:55:00Z
5
value 0.0066
scoring_system epss
scoring_elements 0.71101
published_at 2026-04-09T12:55:00Z
6
value 0.0066
scoring_system epss
scoring_elements 0.71124
published_at 2026-04-11T12:55:00Z
7
value 0.0066
scoring_system epss
scoring_elements 0.71109
published_at 2026-04-12T12:55:00Z
8
value 0.0066
scoring_system epss
scoring_elements 0.71093
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9894
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879536
reference_id 1879536
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879536
11
reference_url https://security.gentoo.org/glsa/202007-61
reference_id GLSA-202007-61
reference_type
scores
url https://security.gentoo.org/glsa/202007-61
12
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/4444-1/
reference_id USN-4444-1
reference_type
scores
url https://usn.ubuntu.com/4444-1/
fixed_packages
aliases CVE-2020-9894
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-9ngd-m4ac-mba1
70
url VCID-a35x-vamv-zyez
vulnerability_id VCID-a35x-vamv-zyez
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32370.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32370
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08134
published_at 2026-04-02T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.08164
published_at 2026-04-13T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08192
published_at 2026-04-08T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.0821
published_at 2026-04-09T12:55:00Z
4
value 0.00029
scoring_system epss
scoring_elements 0.08201
published_at 2026-04-11T12:55:00Z
5
value 0.00029
scoring_system epss
scoring_elements 0.08181
published_at 2026-04-12T12:55:00Z
6
value 0.00029
scoring_system epss
scoring_elements 0.08177
published_at 2026-04-04T12:55:00Z
7
value 0.00029
scoring_system epss
scoring_elements 0.08123
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32370
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url http://www.openwall.com/lists/oss-security/2023/09/11/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/
url http://www.openwall.com/lists/oss-security/2023/09/11/1
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238944
reference_id 2238944
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238944
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-09-30T18:17:38Z/
url https://support.apple.com/en-us/HT213670
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-32370
risk_score 2.4
exploitability 0.5
weighted_severity 4.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-a35x-vamv-zyez
71
url VCID-afqa-zafe-cqhn
vulnerability_id VCID-afqa-zafe-cqhn
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21806.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21806
reference_id
reference_type
scores
0
value 0.02072
scoring_system epss
scoring_elements 0.83883
published_at 2026-04-01T12:55:00Z
1
value 0.02072
scoring_system epss
scoring_elements 0.83952
published_at 2026-04-13T12:55:00Z
2
value 0.02072
scoring_system epss
scoring_elements 0.83946
published_at 2026-04-09T12:55:00Z
3
value 0.02072
scoring_system epss
scoring_elements 0.83962
published_at 2026-04-11T12:55:00Z
4
value 0.02072
scoring_system epss
scoring_elements 0.83956
published_at 2026-04-12T12:55:00Z
5
value 0.02072
scoring_system epss
scoring_elements 0.83897
published_at 2026-04-02T12:55:00Z
6
value 0.02072
scoring_system epss
scoring_elements 0.83913
published_at 2026-04-04T12:55:00Z
7
value 0.02072
scoring_system epss
scoring_elements 0.83916
published_at 2026-04-07T12:55:00Z
8
value 0.02072
scoring_system epss
scoring_elements 0.8394
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1980441
reference_id 1980441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1980441
12
reference_url https://security.archlinux.org/AVG-2214
reference_id AVG-2214
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2214
13
reference_url https://security.archlinux.org/AVG-2215
reference_id AVG-2215
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2215
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-21806
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-afqa-zafe-cqhn
72
url VCID-apee-zyq1-9fdz
vulnerability_id VCID-apee-zyq1-9fdz
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22629.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22629.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22629
reference_id
reference_type
scores
0
value 0.21722
scoring_system epss
scoring_elements 0.95744
published_at 2026-04-13T12:55:00Z
1
value 0.21722
scoring_system epss
scoring_elements 0.95716
published_at 2026-04-02T12:55:00Z
2
value 0.21722
scoring_system epss
scoring_elements 0.95723
published_at 2026-04-04T12:55:00Z
3
value 0.21722
scoring_system epss
scoring_elements 0.95726
published_at 2026-04-07T12:55:00Z
4
value 0.21722
scoring_system epss
scoring_elements 0.95735
published_at 2026-04-08T12:55:00Z
5
value 0.21722
scoring_system epss
scoring_elements 0.95739
published_at 2026-04-09T12:55:00Z
6
value 0.21722
scoring_system epss
scoring_elements 0.95743
published_at 2026-04-11T12:55:00Z
7
value 0.21722
scoring_system epss
scoring_elements 0.95742
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22629
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073899
reference_id 2073899
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073899
8
reference_url https://security.archlinux.org/AVG-2703
reference_id AVG-2703
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2703
9
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
10
reference_url https://support.apple.com/en-us/HT213182
reference_id HT213182
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/
url https://support.apple.com/en-us/HT213182
11
reference_url https://support.apple.com/en-us/HT213186
reference_id HT213186
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/
url https://support.apple.com/en-us/HT213186
12
reference_url https://support.apple.com/en-us/HT213187
reference_id HT213187
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/
url https://support.apple.com/en-us/HT213187
13
reference_url https://support.apple.com/en-us/HT213188
reference_id HT213188
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/
url https://support.apple.com/en-us/HT213188
14
reference_url https://support.apple.com/en-us/HT213193
reference_id HT213193
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T14:46:47Z/
url https://support.apple.com/en-us/HT213193
15
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
16
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/5394-1/
reference_id USN-5394-1
reference_type
scores
url https://usn.ubuntu.com/5394-1/
fixed_packages
aliases CVE-2022-22629
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-apee-zyq1-9fdz
73
url VCID-azef-hxum-z3eb
vulnerability_id VCID-azef-hxum-z3eb
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24201.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
reference_id
reference_type
scores
0
value 0.0008
scoring_system epss
scoring_elements 0.23755
published_at 2026-04-04T12:55:00Z
1
value 0.0008
scoring_system epss
scoring_elements 0.23536
published_at 2026-04-07T12:55:00Z
2
value 0.00087
scoring_system epss
scoring_elements 0.24888
published_at 2026-04-13T12:55:00Z
3
value 0.00087
scoring_system epss
scoring_elements 0.24922
published_at 2026-04-08T12:55:00Z
4
value 0.00087
scoring_system epss
scoring_elements 0.24969
published_at 2026-04-09T12:55:00Z
5
value 0.00087
scoring_system epss
scoring_elements 0.24983
published_at 2026-04-11T12:55:00Z
6
value 0.00087
scoring_system epss
scoring_elements 0.24943
published_at 2026-04-12T12:55:00Z
7
value 0.00098
scoring_system epss
scoring_elements 0.27125
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24201
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24201
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122281
reference_id 122281
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122281
5
reference_url https://support.apple.com/en-us/122283
reference_id 122283
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122283
6
reference_url https://support.apple.com/en-us/122284
reference_id 122284
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122284
7
reference_url https://support.apple.com/en-us/122285
reference_id 122285
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122285
8
reference_url https://support.apple.com/en-us/122345
reference_id 122345
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122345
9
reference_url https://support.apple.com/en-us/122346
reference_id 122346
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122346
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122372
11
reference_url https://support.apple.com/en-us/122376
reference_id 122376
reference_type
scores
0
value 10
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-11-12T14:31:38Z/
url https://support.apple.com/en-us/122376
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
reference_id 2351802
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2351802
13
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://access.redhat.com/errata/RHSA-2025:2863
reference_id RHSA-2025:2863
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2863
16
reference_url https://access.redhat.com/errata/RHSA-2025:2864
reference_id RHSA-2025:2864
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2864
17
reference_url https://access.redhat.com/errata/RHSA-2025:2997
reference_id RHSA-2025:2997
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2997
18
reference_url https://access.redhat.com/errata/RHSA-2025:2998
reference_id RHSA-2025:2998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2998
19
reference_url https://access.redhat.com/errata/RHSA-2025:3000
reference_id RHSA-2025:3000
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3000
20
reference_url https://access.redhat.com/errata/RHSA-2025:3001
reference_id RHSA-2025:3001
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3001
21
reference_url https://access.redhat.com/errata/RHSA-2025:3002
reference_id RHSA-2025:3002
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3002
22
reference_url https://access.redhat.com/errata/RHSA-2025:3005
reference_id RHSA-2025:3005
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3005
23
reference_url https://access.redhat.com/errata/RHSA-2025:3034
reference_id RHSA-2025:3034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3034
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
aliases CVE-2025-24201
risk_score 10.0
exploitability 2.0
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-azef-hxum-z3eb
74
url VCID-b3dw-sj5b-5bhr
vulnerability_id VCID-b3dw-sj5b-5bhr
summary webkit: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54502.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54502
reference_id
reference_type
scores
0
value 0.05739
scoring_system epss
scoring_elements 0.9041
published_at 2026-04-02T12:55:00Z
1
value 0.07285
scoring_system epss
scoring_elements 0.9167
published_at 2026-04-12T12:55:00Z
2
value 0.07285
scoring_system epss
scoring_elements 0.91637
published_at 2026-04-04T12:55:00Z
3
value 0.07285
scoring_system epss
scoring_elements 0.91645
published_at 2026-04-07T12:55:00Z
4
value 0.07285
scoring_system epss
scoring_elements 0.91658
published_at 2026-04-08T12:55:00Z
5
value 0.07285
scoring_system epss
scoring_elements 0.91664
published_at 2026-04-09T12:55:00Z
6
value 0.07285
scoring_system epss
scoring_elements 0.91667
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54502
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54502
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T15:31:16Z/
url https://support.apple.com/en-us/121846
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333843
reference_id 2333843
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333843
11
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
12
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
13
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
14
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
15
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
16
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
17
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
18
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
19
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
aliases CVE-2024-54502
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3dw-sj5b-5bhr
75
url VCID-b3jh-p9hd-ebb7
vulnerability_id VCID-b3jh-p9hd-ebb7
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30934.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30934.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30934
reference_id
reference_type
scores
0
value 0.0169
scoring_system epss
scoring_elements 0.82155
published_at 2026-04-01T12:55:00Z
1
value 0.0169
scoring_system epss
scoring_elements 0.82168
published_at 2026-04-02T12:55:00Z
2
value 0.0169
scoring_system epss
scoring_elements 0.82189
published_at 2026-04-04T12:55:00Z
3
value 0.0169
scoring_system epss
scoring_elements 0.82185
published_at 2026-04-07T12:55:00Z
4
value 0.0169
scoring_system epss
scoring_elements 0.82212
published_at 2026-04-08T12:55:00Z
5
value 0.0169
scoring_system epss
scoring_elements 0.82219
published_at 2026-04-09T12:55:00Z
6
value 0.0169
scoring_system epss
scoring_elements 0.82238
published_at 2026-04-11T12:55:00Z
7
value 0.0169
scoring_system epss
scoring_elements 0.82231
published_at 2026-04-12T12:55:00Z
8
value 0.0169
scoring_system epss
scoring_elements 0.82225
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30934
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044521
reference_id 2044521
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044521
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30934
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b3jh-p9hd-ebb7
76
url VCID-b6zs-hjbz-mugn
vulnerability_id VCID-b6zs-hjbz-mugn
summary webkitgtk: use-after-free in WebCore::Frame::page
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45483.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45483.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45483
reference_id
reference_type
scores
0
value 0.00044
scoring_system epss
scoring_elements 0.1353
published_at 2026-04-01T12:55:00Z
1
value 0.00044
scoring_system epss
scoring_elements 0.1363
published_at 2026-04-02T12:55:00Z
2
value 0.00044
scoring_system epss
scoring_elements 0.13691
published_at 2026-04-04T12:55:00Z
3
value 0.00044
scoring_system epss
scoring_elements 0.13491
published_at 2026-04-07T12:55:00Z
4
value 0.00044
scoring_system epss
scoring_elements 0.13572
published_at 2026-04-08T12:55:00Z
5
value 0.00044
scoring_system epss
scoring_elements 0.13622
published_at 2026-04-09T12:55:00Z
6
value 0.00044
scoring_system epss
scoring_elements 0.13594
published_at 2026-04-11T12:55:00Z
7
value 0.00044
scoring_system epss
scoring_elements 0.13556
published_at 2026-04-12T12:55:00Z
8
value 0.00044
scoring_system epss
scoring_elements 0.13508
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45483
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040331
reference_id 2040331
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040331
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-45483
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b6zs-hjbz-mugn
77
url VCID-b83q-gs49-1yar
vulnerability_id VCID-b83q-gs49-1yar
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26710.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26710.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26710
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40754
published_at 2026-04-04T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40734
published_at 2026-04-09T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40727
published_at 2026-04-08T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40726
published_at 2026-04-02T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40677
published_at 2026-04-07T12:55:00Z
5
value 0.00239
scoring_system epss
scoring_elements 0.46959
published_at 2026-04-13T12:55:00Z
6
value 0.00239
scoring_system epss
scoring_elements 0.46979
published_at 2026-04-11T12:55:00Z
7
value 0.00239
scoring_system epss
scoring_elements 0.46952
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26710
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22677
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26710
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2104789
reference_id 2104789
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2104789
6
reference_url https://security.archlinux.org/AVG-2779
reference_id AVG-2779
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2779
7
reference_url https://security.archlinux.org/AVG-2780
reference_id AVG-2780
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2780
8
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
9
reference_url https://support.apple.com/en-us/HT213253
reference_id HT213253
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/
url https://support.apple.com/en-us/HT213253
10
reference_url https://support.apple.com/en-us/HT213254
reference_id HT213254
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/
url https://support.apple.com/en-us/HT213254
11
reference_url https://support.apple.com/en-us/HT213257
reference_id HT213257
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/
url https://support.apple.com/en-us/HT213257
12
reference_url https://support.apple.com/en-us/HT213258
reference_id HT213258
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:03:23Z/
url https://support.apple.com/en-us/HT213258
13
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
14
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5522-1/
reference_id USN-5522-1
reference_type
scores
url https://usn.ubuntu.com/5522-1/
fixed_packages
aliases CVE-2022-26710
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b83q-gs49-1yar
78
url VCID-b8ws-1k92-7bhq
vulnerability_id VCID-b8ws-1k92-7bhq
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54543
reference_id
reference_type
scores
0
value 0.00134
scoring_system epss
scoring_elements 0.33157
published_at 2026-04-02T12:55:00Z
1
value 0.00143
scoring_system epss
scoring_elements 0.3462
published_at 2026-04-13T12:55:00Z
2
value 0.00143
scoring_system epss
scoring_elements 0.3473
published_at 2026-04-04T12:55:00Z
3
value 0.00143
scoring_system epss
scoring_elements 0.34607
published_at 2026-04-07T12:55:00Z
4
value 0.00143
scoring_system epss
scoring_elements 0.34651
published_at 2026-04-08T12:55:00Z
5
value 0.00143
scoring_system epss
scoring_elements 0.34679
published_at 2026-04-09T12:55:00Z
6
value 0.00143
scoring_system epss
scoring_elements 0.34683
published_at 2026-04-11T12:55:00Z
7
value 0.00143
scoring_system epss
scoring_elements 0.34644
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54543
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/121846
10
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:24:18Z/
url https://support.apple.com/en-us/122372
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344619
reference_id 2344619
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344619
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:1957
reference_id RHSA-2025:1957
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1957
14
reference_url https://access.redhat.com/errata/RHSA-2025:1958
reference_id RHSA-2025:1958
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1958
15
reference_url https://access.redhat.com/errata/RHSA-2025:1959
reference_id RHSA-2025:1959
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1959
16
reference_url https://access.redhat.com/errata/RHSA-2025:1960
reference_id RHSA-2025:1960
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:1960
17
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
18
reference_url https://access.redhat.com/errata/RHSA-2025:2035
reference_id RHSA-2025:2035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2035
19
reference_url https://access.redhat.com/errata/RHSA-2025:2121
reference_id RHSA-2025:2121
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2121
20
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
21
reference_url https://access.redhat.com/errata/RHSA-2025:2126
reference_id RHSA-2025:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2126
fixed_packages
aliases CVE-2024-54543
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b8ws-1k92-7bhq
79
url VCID-b9t6-k4u8-qqbt
vulnerability_id VCID-b9t6-k4u8-qqbt
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30809.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30809.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30809
reference_id
reference_type
scores
0
value 0.00387
scoring_system epss
scoring_elements 0.59731
published_at 2026-04-01T12:55:00Z
1
value 0.00387
scoring_system epss
scoring_elements 0.59805
published_at 2026-04-02T12:55:00Z
2
value 0.00387
scoring_system epss
scoring_elements 0.59829
published_at 2026-04-04T12:55:00Z
3
value 0.00387
scoring_system epss
scoring_elements 0.59799
published_at 2026-04-07T12:55:00Z
4
value 0.00387
scoring_system epss
scoring_elements 0.5985
published_at 2026-04-08T12:55:00Z
5
value 0.00387
scoring_system epss
scoring_elements 0.59864
published_at 2026-04-09T12:55:00Z
6
value 0.00387
scoring_system epss
scoring_elements 0.59885
published_at 2026-04-11T12:55:00Z
7
value 0.00387
scoring_system epss
scoring_elements 0.59869
published_at 2026-04-12T12:55:00Z
8
value 0.00387
scoring_system epss
scoring_elements 0.59851
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30809
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034347
reference_id 2034347
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034347
10
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
11
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30809
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-b9t6-k4u8-qqbt
80
url VCID-bk7s-xwkc-67c4
vulnerability_id VCID-bk7s-xwkc-67c4
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26717.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26717.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26717
reference_id
reference_type
scores
0
value 0.00771
scoring_system epss
scoring_elements 0.73515
published_at 2026-04-04T12:55:00Z
1
value 0.00771
scoring_system epss
scoring_elements 0.73537
published_at 2026-04-09T12:55:00Z
2
value 0.00771
scoring_system epss
scoring_elements 0.73523
published_at 2026-04-08T12:55:00Z
3
value 0.00771
scoring_system epss
scoring_elements 0.73492
published_at 2026-04-02T12:55:00Z
4
value 0.00771
scoring_system epss
scoring_elements 0.73487
published_at 2026-04-07T12:55:00Z
5
value 0.00974
scoring_system epss
scoring_elements 0.76676
published_at 2026-04-13T12:55:00Z
6
value 0.00974
scoring_system epss
scoring_elements 0.76704
published_at 2026-04-11T12:55:00Z
7
value 0.00974
scoring_system epss
scoring_elements 0.76684
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26717
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092735
reference_id 2092735
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092735
10
reference_url https://security.archlinux.org/AVG-2758
reference_id AVG-2758
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2758
11
reference_url https://security.archlinux.org/AVG-2759
reference_id AVG-2759
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2759
12
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
13
reference_url https://support.apple.com/en-us/HT213253
reference_id HT213253
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/
url https://support.apple.com/en-us/HT213253
14
reference_url https://support.apple.com/en-us/HT213254
reference_id HT213254
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/
url https://support.apple.com/en-us/HT213254
15
reference_url https://support.apple.com/en-us/HT213257
reference_id HT213257
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/
url https://support.apple.com/en-us/HT213257
16
reference_url https://support.apple.com/en-us/HT213258
reference_id HT213258
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/
url https://support.apple.com/en-us/HT213258
17
reference_url https://support.apple.com/en-us/HT213259
reference_id HT213259
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/
url https://support.apple.com/en-us/HT213259
18
reference_url https://support.apple.com/en-us/HT213260
reference_id HT213260
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:22:21Z/
url https://support.apple.com/en-us/HT213260
19
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
20
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/5457-1/
reference_id USN-5457-1
reference_type
scores
url https://usn.ubuntu.com/5457-1/
fixed_packages
aliases CVE-2022-26717
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bk7s-xwkc-67c4
81
url VCID-bkcz-d48v-7uca
vulnerability_id VCID-bkcz-d48v-7uca
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24213.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24213
reference_id
reference_type
scores
0
value 0.00126
scoring_system epss
scoring_elements 0.31973
published_at 2026-04-02T12:55:00Z
1
value 0.00126
scoring_system epss
scoring_elements 0.31846
published_at 2026-04-13T12:55:00Z
2
value 0.00126
scoring_system epss
scoring_elements 0.32016
published_at 2026-04-04T12:55:00Z
3
value 0.00126
scoring_system epss
scoring_elements 0.31836
published_at 2026-04-07T12:55:00Z
4
value 0.00126
scoring_system epss
scoring_elements 0.31888
published_at 2026-04-08T12:55:00Z
5
value 0.00126
scoring_system epss
scoring_elements 0.31916
published_at 2026-04-09T12:55:00Z
6
value 0.00126
scoring_system epss
scoring_elements 0.31921
published_at 2026-04-11T12:55:00Z
7
value 0.00126
scoring_system epss
scoring_elements 0.31881
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24213
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24213
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-02T03:55:29Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357913
reference_id 2357913
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357913
12
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
aliases CVE-2025-24213
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bkcz-d48v-7uca
82
url VCID-bm12-ezac-rye8
vulnerability_id VCID-bm12-ezac-rye8
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30897.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30897.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30897
reference_id
reference_type
scores
0
value 0.00312
scoring_system epss
scoring_elements 0.54287
published_at 2026-04-01T12:55:00Z
1
value 0.00312
scoring_system epss
scoring_elements 0.54307
published_at 2026-04-02T12:55:00Z
2
value 0.00312
scoring_system epss
scoring_elements 0.54337
published_at 2026-04-04T12:55:00Z
3
value 0.00312
scoring_system epss
scoring_elements 0.54312
published_at 2026-04-07T12:55:00Z
4
value 0.00312
scoring_system epss
scoring_elements 0.54364
published_at 2026-04-08T12:55:00Z
5
value 0.00312
scoring_system epss
scoring_elements 0.54359
published_at 2026-04-09T12:55:00Z
6
value 0.00312
scoring_system epss
scoring_elements 0.54408
published_at 2026-04-11T12:55:00Z
7
value 0.00312
scoring_system epss
scoring_elements 0.5439
published_at 2026-04-12T12:55:00Z
8
value 0.00312
scoring_system epss
scoring_elements 0.54368
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30897
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2038907
reference_id 2038907
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2038907
4
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
5
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
6
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30897
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bm12-ezac-rye8
83
url VCID-bmta-jy4b-mugh
vulnerability_id VCID-bmta-jy4b-mugh
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-23517.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-23517
reference_id
reference_type
scores
0
value 0.00213
scoring_system epss
scoring_elements 0.43808
published_at 2026-04-02T12:55:00Z
1
value 0.00213
scoring_system epss
scoring_elements 0.43787
published_at 2026-04-13T12:55:00Z
2
value 0.00213
scoring_system epss
scoring_elements 0.43832
published_at 2026-04-04T12:55:00Z
3
value 0.00213
scoring_system epss
scoring_elements 0.43763
published_at 2026-04-07T12:55:00Z
4
value 0.00213
scoring_system epss
scoring_elements 0.43814
published_at 2026-04-08T12:55:00Z
5
value 0.00213
scoring_system epss
scoring_elements 0.43818
published_at 2026-04-09T12:55:00Z
6
value 0.00213
scoring_system epss
scoring_elements 0.43836
published_at 2026-04-11T12:55:00Z
7
value 0.00213
scoring_system epss
scoring_elements 0.43804
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-23517
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167717
reference_id 2167717
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167717
10
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
11
reference_url https://support.apple.com/en-us/HT213599
reference_id HT213599
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213599
12
reference_url https://support.apple.com/en-us/HT213600
reference_id HT213600
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213600
13
reference_url https://support.apple.com/en-us/HT213601
reference_id HT213601
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213601
14
reference_url https://support.apple.com/en-us/HT213603
reference_id HT213603
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213603
15
reference_url https://support.apple.com/en-us/HT213604
reference_id HT213604
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213604
16
reference_url https://support.apple.com/en-us/HT213605
reference_id HT213605
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213605
17
reference_url https://support.apple.com/en-us/HT213606
reference_id HT213606
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213606
18
reference_url https://support.apple.com/en-us/HT213638
reference_id HT213638
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T15:34:25Z/
url https://support.apple.com/en-us/HT213638
19
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
20
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/5867-1/
reference_id USN-5867-1
reference_type
scores
url https://usn.ubuntu.com/5867-1/
fixed_packages
aliases CVE-2023-23517
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-bmta-jy4b-mugh
84
url VCID-br5g-pfa4-33h7
vulnerability_id VCID-br5g-pfa4-33h7
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41074.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41074
reference_id
reference_type
scores
0
value 0.01121
scoring_system epss
scoring_elements 0.78197
published_at 2026-04-02T12:55:00Z
1
value 0.01121
scoring_system epss
scoring_elements 0.78228
published_at 2026-04-04T12:55:00Z
2
value 0.01121
scoring_system epss
scoring_elements 0.78209
published_at 2026-04-07T12:55:00Z
3
value 0.01121
scoring_system epss
scoring_elements 0.78236
published_at 2026-04-08T12:55:00Z
4
value 0.01121
scoring_system epss
scoring_elements 0.78241
published_at 2026-04-09T12:55:00Z
5
value 0.01121
scoring_system epss
scoring_elements 0.78267
published_at 2026-04-11T12:55:00Z
6
value 0.01121
scoring_system epss
scoring_elements 0.7825
published_at 2026-04-12T12:55:00Z
7
value 0.01121
scoring_system epss
scoring_elements 0.78245
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241412
reference_id 2241412
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241412
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/6426-1/
reference_id USN-6426-1
reference_type
scores
url https://usn.ubuntu.com/6426-1/
fixed_packages
aliases CVE-2023-41074
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-br5g-pfa4-33h7
85
url VCID-btcm-r2s6-vubj
vulnerability_id VCID-btcm-r2s6-vubj
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28205.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28205
reference_id
reference_type
scores
0
value 0.00068
scoring_system epss
scoring_elements 0.21077
published_at 2026-04-13T12:55:00Z
1
value 0.00068
scoring_system epss
scoring_elements 0.21099
published_at 2026-04-08T12:55:00Z
2
value 0.00068
scoring_system epss
scoring_elements 0.2116
published_at 2026-04-09T12:55:00Z
3
value 0.00068
scoring_system epss
scoring_elements 0.21171
published_at 2026-04-11T12:55:00Z
4
value 0.00068
scoring_system epss
scoring_elements 0.21128
published_at 2026-04-12T12:55:00Z
5
value 0.00093
scoring_system epss
scoring_elements 0.2621
published_at 2026-04-04T12:55:00Z
6
value 0.00093
scoring_system epss
scoring_elements 0.25982
published_at 2026-04-07T12:55:00Z
7
value 0.00112
scoring_system epss
scoring_elements 0.29806
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28205
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2185724
reference_id 2185724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2185724
14
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
15
reference_url https://support.apple.com/en-us/HT213720
reference_id HT213720
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/
url https://support.apple.com/en-us/HT213720
16
reference_url https://support.apple.com/en-us/HT213721
reference_id HT213721
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/
url https://support.apple.com/en-us/HT213721
17
reference_url https://support.apple.com/en-us/HT213722
reference_id HT213722
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/
url https://support.apple.com/en-us/HT213722
18
reference_url https://support.apple.com/en-us/HT213723
reference_id HT213723
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-28T21:10:57Z/
url https://support.apple.com/en-us/HT213723
19
reference_url https://access.redhat.com/errata/RHSA-2023:1918
reference_id RHSA-2023:1918
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1918
20
reference_url https://access.redhat.com/errata/RHSA-2023:1919
reference_id RHSA-2023:1919
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:1919
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2023-28205
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-btcm-r2s6-vubj
86
url VCID-c4mn-f4k4-wqe9
vulnerability_id VCID-c4mn-f4k4-wqe9
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32886.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32886.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32886
reference_id
reference_type
scores
0
value 0.00876
scoring_system epss
scoring_elements 0.75296
published_at 2026-04-13T12:55:00Z
1
value 0.00876
scoring_system epss
scoring_elements 0.75246
published_at 2026-04-02T12:55:00Z
2
value 0.00876
scoring_system epss
scoring_elements 0.75278
published_at 2026-04-04T12:55:00Z
3
value 0.00876
scoring_system epss
scoring_elements 0.75255
published_at 2026-04-07T12:55:00Z
4
value 0.00876
scoring_system epss
scoring_elements 0.75298
published_at 2026-04-08T12:55:00Z
5
value 0.00876
scoring_system epss
scoring_elements 0.75308
published_at 2026-04-09T12:55:00Z
6
value 0.00876
scoring_system epss
scoring_elements 0.75329
published_at 2026-04-11T12:55:00Z
7
value 0.00876
scoring_system epss
scoring_elements 0.75307
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32886
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2128643
reference_id 2128643
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2128643
16
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
17
reference_url http://seclists.org/fulldisclosure/2022/Oct/39
reference_id 39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url http://seclists.org/fulldisclosure/2022/Oct/39
18
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/
reference_id 74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74MXH2U5GA4CX3L3NLYP4TBO4O2VOPBJ/
20
reference_url https://security.archlinux.org/AVG-2819
reference_id AVG-2819
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2819
21
reference_url https://security.archlinux.org/AVG-2820
reference_id AVG-2820
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2820
22
reference_url https://www.debian.org/security/2022/dsa-5240
reference_id dsa-5240
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://www.debian.org/security/2022/dsa-5240
23
reference_url https://www.debian.org/security/2022/dsa-5241
reference_id dsa-5241
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://www.debian.org/security/2022/dsa-5241
24
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://security.gentoo.org/glsa/202305-32
25
reference_url https://support.apple.com/en-us/HT213442
reference_id HT213442
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://support.apple.com/en-us/HT213442
26
reference_url https://support.apple.com/en-us/HT213445
reference_id HT213445
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://support.apple.com/en-us/HT213445
27
reference_url https://support.apple.com/en-us/HT213446
reference_id HT213446
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://support.apple.com/en-us/HT213446
28
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/
reference_id KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KDV6OLKDTL55NH4LNSMLQ4D6LLSX6JU2/
29
reference_url https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html
reference_id msg00034.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.debian.org/debian-lts-announce/2022/09/msg00034.html
30
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
31
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
32
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
33
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/
reference_id TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:14:06Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TDNT32WIARRD2ANWKGCTTIQXI6OII7HZ/
34
reference_url https://usn.ubuntu.com/5642-1/
reference_id USN-5642-1
reference_type
scores
url https://usn.ubuntu.com/5642-1/
fixed_packages
aliases CVE-2022-32886
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4mn-f4k4-wqe9
87
url VCID-c4np-b4zq-tkch
vulnerability_id VCID-c4np-b4zq-tkch
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31204.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31204
reference_id
reference_type
scores
0
value 0.00666
scoring_system epss
scoring_elements 0.71229
published_at 2026-04-13T12:55:00Z
1
value 0.00666
scoring_system epss
scoring_elements 0.71188
published_at 2026-04-02T12:55:00Z
2
value 0.00666
scoring_system epss
scoring_elements 0.71206
published_at 2026-04-04T12:55:00Z
3
value 0.00666
scoring_system epss
scoring_elements 0.71181
published_at 2026-04-07T12:55:00Z
4
value 0.00666
scoring_system epss
scoring_elements 0.71223
published_at 2026-04-08T12:55:00Z
5
value 0.00666
scoring_system epss
scoring_elements 0.71237
published_at 2026-04-09T12:55:00Z
6
value 0.00666
scoring_system epss
scoring_elements 0.7126
published_at 2026-04-11T12:55:00Z
7
value 0.00666
scoring_system epss
scoring_elements 0.71245
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31204
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31204
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T20:16:09Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366500
reference_id 2366500
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366500
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
aliases CVE-2025-31204
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c4np-b4zq-tkch
88
url VCID-c9mb-24v2-q3ba
vulnerability_id VCID-c9mb-24v2-q3ba
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31215.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31215
reference_id
reference_type
scores
0
value 0.01121
scoring_system epss
scoring_elements 0.78251
published_at 2026-04-13T12:55:00Z
1
value 0.01121
scoring_system epss
scoring_elements 0.78203
published_at 2026-04-02T12:55:00Z
2
value 0.01121
scoring_system epss
scoring_elements 0.78233
published_at 2026-04-04T12:55:00Z
3
value 0.01121
scoring_system epss
scoring_elements 0.78215
published_at 2026-04-07T12:55:00Z
4
value 0.01121
scoring_system epss
scoring_elements 0.78242
published_at 2026-04-08T12:55:00Z
5
value 0.01121
scoring_system epss
scoring_elements 0.78247
published_at 2026-04-09T12:55:00Z
6
value 0.01121
scoring_system epss
scoring_elements 0.78272
published_at 2026-04-11T12:55:00Z
7
value 0.01121
scoring_system epss
scoring_elements 0.78256
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31215
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31215
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-15T13:19:08Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366503
reference_id 2366503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366503
12
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
13
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
14
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
15
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
19
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
20
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
21
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
aliases CVE-2025-31215
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-c9mb-24v2-q3ba
89
url VCID-cc7v-7r6y-nkcp
vulnerability_id VCID-cc7v-7r6y-nkcp
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25358.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-25358.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-25358
reference_id
reference_type
scores
0
value 0.00161
scoring_system epss
scoring_elements 0.37082
published_at 2026-04-02T12:55:00Z
1
value 0.00161
scoring_system epss
scoring_elements 0.36955
published_at 2026-04-13T12:55:00Z
2
value 0.00161
scoring_system epss
scoring_elements 0.37116
published_at 2026-04-04T12:55:00Z
3
value 0.00161
scoring_system epss
scoring_elements 0.36943
published_at 2026-04-07T12:55:00Z
4
value 0.00161
scoring_system epss
scoring_elements 0.36994
published_at 2026-04-08T12:55:00Z
5
value 0.00161
scoring_system epss
scoring_elements 0.37007
published_at 2026-04-09T12:55:00Z
6
value 0.00161
scoring_system epss
scoring_elements 0.37016
published_at 2026-04-11T12:55:00Z
7
value 0.00161
scoring_system epss
scoring_elements 0.36981
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-25358
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2175099
reference_id 2175099
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2175099
16
reference_url http://www.openwall.com/lists/oss-security/2023/04/21/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url http://www.openwall.com/lists/oss-security/2023/04/21/3
17
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/
reference_id 5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5OKKVEUQAAGH3NHMX3WHWKRPYU4QFKTQ/
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/
reference_id 6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6QL5OGMSHRQ26FTYWZUXVNWB2VHOSVXK/
19
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://security.gentoo.org/glsa/202305-32
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/
reference_id KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KC7DMUX37BRCLAI4VPQYHDUVEGTNYN5A/
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://bugs.webkit.org/show_bug.cgi?id=242683
reference_id show_bug.cgi?id=242683
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-07T15:57:29Z/
url https://bugs.webkit.org/show_bug.cgi?id=242683
25
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2023-25358
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cc7v-7r6y-nkcp
90
url VCID-ceyb-j3sq-27fh
vulnerability_id VCID-ceyb-j3sq-27fh
summary webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27856.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27856.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27856
reference_id
reference_type
scores
0
value 0.00025
scoring_system epss
scoring_elements 0.07092
published_at 2026-04-13T12:55:00Z
1
value 0.00025
scoring_system epss
scoring_elements 0.06996
published_at 2026-04-02T12:55:00Z
2
value 0.00025
scoring_system epss
scoring_elements 0.07049
published_at 2026-04-04T12:55:00Z
3
value 0.00025
scoring_system epss
scoring_elements 0.07029
published_at 2026-04-07T12:55:00Z
4
value 0.00025
scoring_system epss
scoring_elements 0.07084
published_at 2026-04-08T12:55:00Z
5
value 0.00025
scoring_system epss
scoring_elements 0.07114
published_at 2026-04-11T12:55:00Z
6
value 0.00025
scoring_system epss
scoring_elements 0.07103
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27856
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27856
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120896
5
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120898
6
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120901
7
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120902
8
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120903
9
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120905
10
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-24T04:56:04Z/
url https://support.apple.com/en-us/120906
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344618
reference_id 2344618
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344618
12
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
13
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
14
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
15
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
16
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-27856
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ceyb-j3sq-27fh
91
url VCID-cjg6-jkzc-uyg8
vulnerability_id VCID-cjg6-jkzc-uyg8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46700.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46700.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46700
reference_id
reference_type
scores
0
value 0.00689
scoring_system epss
scoring_elements 0.71715
published_at 2026-04-02T12:55:00Z
1
value 0.00689
scoring_system epss
scoring_elements 0.71747
published_at 2026-04-13T12:55:00Z
2
value 0.00689
scoring_system epss
scoring_elements 0.71733
published_at 2026-04-04T12:55:00Z
3
value 0.00689
scoring_system epss
scoring_elements 0.71707
published_at 2026-04-07T12:55:00Z
4
value 0.00689
scoring_system epss
scoring_elements 0.71746
published_at 2026-04-08T12:55:00Z
5
value 0.00689
scoring_system epss
scoring_elements 0.71758
published_at 2026-04-09T12:55:00Z
6
value 0.00689
scoring_system epss
scoring_elements 0.71782
published_at 2026-04-11T12:55:00Z
7
value 0.00689
scoring_system epss
scoring_elements 0.71765
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46700
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156994
reference_id 2156994
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156994
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213531
18
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213532
19
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213535
20
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213536
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T13:44:07Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
23
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-46700
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjg6-jkzc-uyg8
92
url VCID-cjn2-p55e-bbbs
vulnerability_id VCID-cjn2-p55e-bbbs
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30888.json
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30888.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30888
reference_id
reference_type
scores
0
value 0.00216
scoring_system epss
scoring_elements 0.44074
published_at 2026-04-01T12:55:00Z
1
value 0.00216
scoring_system epss
scoring_elements 0.44138
published_at 2026-04-02T12:55:00Z
2
value 0.00216
scoring_system epss
scoring_elements 0.44162
published_at 2026-04-04T12:55:00Z
3
value 0.00216
scoring_system epss
scoring_elements 0.44093
published_at 2026-04-07T12:55:00Z
4
value 0.00216
scoring_system epss
scoring_elements 0.44144
published_at 2026-04-08T12:55:00Z
5
value 0.00216
scoring_system epss
scoring_elements 0.44147
published_at 2026-04-09T12:55:00Z
6
value 0.00216
scoring_system epss
scoring_elements 0.44163
published_at 2026-04-11T12:55:00Z
7
value 0.00216
scoring_system epss
scoring_elements 0.4413
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30888
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034383
reference_id 2034383
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034383
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30888
risk_score 3.4
exploitability 0.5
weighted_severity 6.7
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cjn2-p55e-bbbs
93
url VCID-ckrd-x24d-cyav
vulnerability_id VCID-ckrd-x24d-cyav
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9952.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9952
reference_id
reference_type
scores
0
value 0.00506
scoring_system epss
scoring_elements 0.66163
published_at 2026-04-01T12:55:00Z
1
value 0.00506
scoring_system epss
scoring_elements 0.66237
published_at 2026-04-13T12:55:00Z
2
value 0.00506
scoring_system epss
scoring_elements 0.66281
published_at 2026-04-11T12:55:00Z
3
value 0.00506
scoring_system epss
scoring_elements 0.66268
published_at 2026-04-12T12:55:00Z
4
value 0.00506
scoring_system epss
scoring_elements 0.66204
published_at 2026-04-02T12:55:00Z
5
value 0.00506
scoring_system epss
scoring_elements 0.66231
published_at 2026-04-04T12:55:00Z
6
value 0.00506
scoring_system epss
scoring_elements 0.662
published_at 2026-04-07T12:55:00Z
7
value 0.00506
scoring_system epss
scoring_elements 0.66248
published_at 2026-04-08T12:55:00Z
8
value 0.00506
scoring_system epss
scoring_elements 0.66261
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901219
reference_id 1901219
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901219
11
reference_url https://security.archlinux.org/AVG-1292
reference_id AVG-1292
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1292
12
reference_url https://security.gentoo.org/glsa/202012-10
reference_id GLSA-202012-10
reference_type
scores
url https://security.gentoo.org/glsa/202012-10
13
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://usn.ubuntu.com/4648-1/
reference_id USN-4648-1
reference_type
scores
url https://usn.ubuntu.com/4648-1/
fixed_packages
aliases CVE-2020-9952
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ckrd-x24d-cyav
94
url VCID-cmdy-ztbw-jffq
vulnerability_id VCID-cmdy-ztbw-jffq
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54551.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54551
reference_id
reference_type
scores
0
value 0.00504
scoring_system epss
scoring_elements 0.66155
published_at 2026-04-13T12:55:00Z
1
value 0.00504
scoring_system epss
scoring_elements 0.66123
published_at 2026-04-02T12:55:00Z
2
value 0.00504
scoring_system epss
scoring_elements 0.6615
published_at 2026-04-04T12:55:00Z
3
value 0.00504
scoring_system epss
scoring_elements 0.66118
published_at 2026-04-07T12:55:00Z
4
value 0.00504
scoring_system epss
scoring_elements 0.66167
published_at 2026-04-08T12:55:00Z
5
value 0.00504
scoring_system epss
scoring_elements 0.6618
published_at 2026-04-09T12:55:00Z
6
value 0.00504
scoring_system epss
scoring_elements 0.66199
published_at 2026-04-11T12:55:00Z
7
value 0.00504
scoring_system epss
scoring_elements 0.66186
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54551
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54551
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120909
5
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120911
6
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120913
7
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120914
8
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120915
9
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2025-03-21T16:38:07Z/
url https://support.apple.com/en-us/120916
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357909
reference_id 2357909
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357909
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
20
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
21
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
22
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
23
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
aliases CVE-2024-54551
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cmdy-ztbw-jffq
95
url VCID-cuwm-antx-6ye4
vulnerability_id VCID-cuwm-antx-6ye4
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30661.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30661.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30661
reference_id
reference_type
scores
0
value 0.00146
scoring_system epss
scoring_elements 0.34876
published_at 2026-04-01T12:55:00Z
1
value 0.00146
scoring_system epss
scoring_elements 0.34998
published_at 2026-04-13T12:55:00Z
2
value 0.00146
scoring_system epss
scoring_elements 0.35073
published_at 2026-04-02T12:55:00Z
3
value 0.00146
scoring_system epss
scoring_elements 0.35101
published_at 2026-04-04T12:55:00Z
4
value 0.00146
scoring_system epss
scoring_elements 0.3498
published_at 2026-04-07T12:55:00Z
5
value 0.00146
scoring_system epss
scoring_elements 0.35025
published_at 2026-04-08T12:55:00Z
6
value 0.00146
scoring_system epss
scoring_elements 0.35054
published_at 2026-04-09T12:55:00Z
7
value 0.00146
scoring_system epss
scoring_elements 0.35058
published_at 2026-04-11T12:55:00Z
8
value 0.00146
scoring_system epss
scoring_elements 0.35022
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30661
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986870
reference_id 1986870
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986870
14
reference_url https://security.archlinux.org/AVG-2208
reference_id AVG-2208
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2208
15
reference_url https://security.archlinux.org/AVG-2209
reference_id AVG-2209
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2209
16
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
17
reference_url https://support.apple.com/en-us/HT212317
reference_id HT212317
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/
url https://support.apple.com/en-us/HT212317
18
reference_url https://support.apple.com/en-us/HT212318
reference_id HT212318
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/
url https://support.apple.com/en-us/HT212318
19
reference_url https://support.apple.com/en-us/HT212323
reference_id HT212323
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/
url https://support.apple.com/en-us/HT212323
20
reference_url https://support.apple.com/en-us/HT212324
reference_id HT212324
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/
url https://support.apple.com/en-us/HT212324
21
reference_url https://support.apple.com/en-us/HT212325
reference_id HT212325
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/
url https://support.apple.com/en-us/HT212325
22
reference_url https://support.apple.com/en-us/HT212341
reference_id HT212341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:03Z/
url https://support.apple.com/en-us/HT212341
23
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30661
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cuwm-antx-6ye4
96
url VCID-cw56-pdyr-fbge
vulnerability_id VCID-cw56-pdyr-fbge
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24216.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24216
reference_id
reference_type
scores
0
value 0.00821
scoring_system epss
scoring_elements 0.74363
published_at 2026-04-02T12:55:00Z
1
value 0.00821
scoring_system epss
scoring_elements 0.74405
published_at 2026-04-13T12:55:00Z
2
value 0.00821
scoring_system epss
scoring_elements 0.7439
published_at 2026-04-04T12:55:00Z
3
value 0.00821
scoring_system epss
scoring_elements 0.74364
published_at 2026-04-07T12:55:00Z
4
value 0.00821
scoring_system epss
scoring_elements 0.74397
published_at 2026-04-08T12:55:00Z
5
value 0.00821
scoring_system epss
scoring_elements 0.74412
published_at 2026-04-09T12:55:00Z
6
value 0.00821
scoring_system epss
scoring_elements 0.74433
published_at 2026-04-11T12:55:00Z
7
value 0.00821
scoring_system epss
scoring_elements 0.74413
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24216
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24216
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-02T14:13:08Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357917
reference_id 2357917
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357917
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
aliases CVE-2025-24216
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-cw56-pdyr-fbge
97
url VCID-dafx-64dz-ubfw
vulnerability_id VCID-dafx-64dz-ubfw
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41983.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41983
reference_id
reference_type
scores
0
value 0.01108
scoring_system epss
scoring_elements 0.78065
published_at 2026-04-02T12:55:00Z
1
value 0.01108
scoring_system epss
scoring_elements 0.78095
published_at 2026-04-04T12:55:00Z
2
value 0.01108
scoring_system epss
scoring_elements 0.78077
published_at 2026-04-07T12:55:00Z
3
value 0.01108
scoring_system epss
scoring_elements 0.78103
published_at 2026-04-08T12:55:00Z
4
value 0.01108
scoring_system epss
scoring_elements 0.78107
published_at 2026-04-09T12:55:00Z
5
value 0.01108
scoring_system epss
scoring_elements 0.78133
published_at 2026-04-11T12:55:00Z
6
value 0.01108
scoring_system epss
scoring_elements 0.78115
published_at 2026-04-12T12:55:00Z
7
value 0.01108
scoring_system epss
scoring_elements 0.78111
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41983
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271453
reference_id 2271453
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271453
6
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
7
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
8
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
9
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
10
reference_url https://usn.ubuntu.com/6490-1/
reference_id USN-6490-1
reference_type
scores
url https://usn.ubuntu.com/6490-1/
fixed_packages
aliases CVE-2023-41983
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dafx-64dz-ubfw
98
url VCID-dd4q-8fs5-3kej
vulnerability_id VCID-dd4q-8fs5-3kej
summary webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44308.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44308
reference_id
reference_type
scores
0
value 0.01547
scoring_system epss
scoring_elements 0.81399
published_at 2026-04-13T12:55:00Z
1
value 0.01547
scoring_system epss
scoring_elements 0.81343
published_at 2026-04-02T12:55:00Z
2
value 0.01547
scoring_system epss
scoring_elements 0.81366
published_at 2026-04-04T12:55:00Z
3
value 0.01547
scoring_system epss
scoring_elements 0.81364
published_at 2026-04-07T12:55:00Z
4
value 0.01547
scoring_system epss
scoring_elements 0.81393
published_at 2026-04-08T12:55:00Z
5
value 0.01547
scoring_system epss
scoring_elements 0.81397
published_at 2026-04-09T12:55:00Z
6
value 0.01547
scoring_system epss
scoring_elements 0.81419
published_at 2026-04-11T12:55:00Z
7
value 0.01547
scoring_system epss
scoring_elements 0.81406
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44308
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44308
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121752
reference_id 121752
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121752
5
reference_url https://support.apple.com/en-us/121753
reference_id 121753
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121753
6
reference_url https://support.apple.com/en-us/121754
reference_id 121754
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121754
7
reference_url https://support.apple.com/en-us/121755
reference_id 121755
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121755
8
reference_url https://support.apple.com/en-us/121756
reference_id 121756
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-11-23T04:55:46Z/
url https://support.apple.com/en-us/121756
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327931
reference_id 2327931
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327931
10
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
11
reference_url https://usn.ubuntu.com/7142-1/
reference_id USN-7142-1
reference_type
scores
url https://usn.ubuntu.com/7142-1/
fixed_packages
aliases CVE-2024-44308
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dd4q-8fs5-3kej
99
url VCID-drtd-1c4r-1bbf
vulnerability_id VCID-drtd-1c4r-1bbf
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42970.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42970.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42970
reference_id
reference_type
scores
0
value 0.00467
scoring_system epss
scoring_elements 0.64453
published_at 2026-04-13T12:55:00Z
1
value 0.00467
scoring_system epss
scoring_elements 0.64424
published_at 2026-04-02T12:55:00Z
2
value 0.00467
scoring_system epss
scoring_elements 0.64455
published_at 2026-04-04T12:55:00Z
3
value 0.00467
scoring_system epss
scoring_elements 0.64414
published_at 2026-04-07T12:55:00Z
4
value 0.00467
scoring_system epss
scoring_elements 0.64462
published_at 2026-04-08T12:55:00Z
5
value 0.00467
scoring_system epss
scoring_elements 0.64478
published_at 2026-04-09T12:55:00Z
6
value 0.00467
scoring_system epss
scoring_elements 0.64494
published_at 2026-04-11T12:55:00Z
7
value 0.00467
scoring_system epss
scoring_elements 0.64481
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42970
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://support.apple.com/en-us/120330
reference_id 120330
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/
url https://support.apple.com/en-us/120330
14
reference_url https://support.apple.com/en-us/120947
reference_id 120947
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/
url https://support.apple.com/en-us/120947
15
reference_url https://support.apple.com/en-us/120948
reference_id 120948
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/
url https://support.apple.com/en-us/120948
16
reference_url https://support.apple.com/en-us/120949
reference_id 120949
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/
url https://support.apple.com/en-us/120949
17
reference_url https://support.apple.com/en-us/120950
reference_id 120950
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T17:09:36Z/
url https://support.apple.com/en-us/120950
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366498
reference_id 2366498
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366498
19
reference_url https://security.archlinux.org/ASA-202505-2
reference_id ASA-202505-2
reference_type
scores
url https://security.archlinux.org/ASA-202505-2
20
reference_url https://security.archlinux.org/ASA-202505-3
reference_id ASA-202505-3
reference_type
scores
url https://security.archlinux.org/ASA-202505-3
21
reference_url https://security.archlinux.org/ASA-202505-4
reference_id ASA-202505-4
reference_type
scores
url https://security.archlinux.org/ASA-202505-4
22
reference_url https://security.archlinux.org/ASA-202505-5
reference_id ASA-202505-5
reference_type
scores
url https://security.archlinux.org/ASA-202505-5
23
reference_url https://security.archlinux.org/AVG-2867
reference_id AVG-2867
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2867
24
reference_url https://security.archlinux.org/AVG-2868
reference_id AVG-2868
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2868
25
reference_url https://security.archlinux.org/AVG-2869
reference_id AVG-2869
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2869
26
reference_url https://security.archlinux.org/AVG-2870
reference_id AVG-2870
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2870
27
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
28
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
29
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
30
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
31
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
32
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
33
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
34
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
35
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-42970
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-drtd-1c4r-1bbf
100
url VCID-dsb1-yxm6-dkcf
vulnerability_id VCID-dsb1-yxm6-dkcf
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42824.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42824.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42824
reference_id
reference_type
scores
0
value 0.00029
scoring_system epss
scoring_elements 0.08383
published_at 2026-04-09T12:55:00Z
1
value 0.00029
scoring_system epss
scoring_elements 0.0833
published_at 2026-04-02T12:55:00Z
2
value 0.00029
scoring_system epss
scoring_elements 0.08366
published_at 2026-04-08T12:55:00Z
3
value 0.00029
scoring_system epss
scoring_elements 0.08303
published_at 2026-04-07T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09601
published_at 2026-04-13T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09648
published_at 2026-04-11T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09617
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42824
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140504
reference_id 2140504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140504
8
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
reference_id 5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
reference_id AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
11
reference_url https://www.debian.org/security/2022/dsa-5273
reference_id dsa-5273
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://www.debian.org/security/2022/dsa-5273
12
reference_url https://www.debian.org/security/2022/dsa-5274
reference_id dsa-5274
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://www.debian.org/security/2022/dsa-5274
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213488
15
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213489
16
reference_url https://support.apple.com/en-us/HT213491
reference_id HT213491
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213491
17
reference_url https://support.apple.com/en-us/HT213492
reference_id HT213492
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213492
18
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://support.apple.com/en-us/HT213495
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
reference_id JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
20
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T15:32:34Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
aliases CVE-2022-42824
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dsb1-yxm6-dkcf
101
url VCID-dxsm-nf4f-yfe4
vulnerability_id VCID-dxsm-nf4f-yfe4
summary webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27833
reference_id
reference_type
scores
0
value 0.01223
scoring_system epss
scoring_elements 0.79105
published_at 2026-04-13T12:55:00Z
1
value 0.01223
scoring_system epss
scoring_elements 0.79087
published_at 2026-04-04T12:55:00Z
2
value 0.01223
scoring_system epss
scoring_elements 0.79072
published_at 2026-04-07T12:55:00Z
3
value 0.01223
scoring_system epss
scoring_elements 0.79097
published_at 2026-04-08T12:55:00Z
4
value 0.01223
scoring_system epss
scoring_elements 0.79104
published_at 2026-04-09T12:55:00Z
5
value 0.01223
scoring_system epss
scoring_elements 0.79128
published_at 2026-04-11T12:55:00Z
6
value 0.01223
scoring_system epss
scoring_elements 0.79115
published_at 2026-04-12T12:55:00Z
7
value 0.01652
scoring_system epss
scoring_elements 0.81967
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27833
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120898
9
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120901
10
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120905
11
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/120906
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314700
reference_id 2314700
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314700
13
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
14
reference_url https://support.apple.com/en-us/HT214100
reference_id HT214100
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214100
15
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214101
16
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214102
17
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214103
18
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:46:49Z/
url https://support.apple.com/en-us/HT214108
19
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
20
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
23
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
24
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
25
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
26
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-27833
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dxsm-nf4f-yfe4
102
url VCID-dz61-8f33-t7ej
vulnerability_id VCID-dz61-8f33-t7ej
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30984.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30984.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30984
reference_id
reference_type
scores
0
value 0.00688
scoring_system epss
scoring_elements 0.71687
published_at 2026-04-01T12:55:00Z
1
value 0.00688
scoring_system epss
scoring_elements 0.71693
published_at 2026-04-02T12:55:00Z
2
value 0.00688
scoring_system epss
scoring_elements 0.71711
published_at 2026-04-04T12:55:00Z
3
value 0.00688
scoring_system epss
scoring_elements 0.71685
published_at 2026-04-07T12:55:00Z
4
value 0.00688
scoring_system epss
scoring_elements 0.71724
published_at 2026-04-08T12:55:00Z
5
value 0.00688
scoring_system epss
scoring_elements 0.71735
published_at 2026-04-09T12:55:00Z
6
value 0.00688
scoring_system epss
scoring_elements 0.71759
published_at 2026-04-11T12:55:00Z
7
value 0.00688
scoring_system epss
scoring_elements 0.71743
published_at 2026-04-12T12:55:00Z
8
value 0.00688
scoring_system epss
scoring_elements 0.71725
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30984
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044553
reference_id 2044553
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044553
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30984
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-dz61-8f33-t7ej
103
url VCID-e1rg-8a3d-z7a5
vulnerability_id VCID-e1rg-8a3d-z7a5
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1765.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1765
reference_id
reference_type
scores
0
value 0.00083
scoring_system epss
scoring_elements 0.24197
published_at 2026-04-01T12:55:00Z
1
value 0.00083
scoring_system epss
scoring_elements 0.24167
published_at 2026-04-13T12:55:00Z
2
value 0.00083
scoring_system epss
scoring_elements 0.24251
published_at 2026-04-09T12:55:00Z
3
value 0.00083
scoring_system epss
scoring_elements 0.24267
published_at 2026-04-11T12:55:00Z
4
value 0.00083
scoring_system epss
scoring_elements 0.24224
published_at 2026-04-12T12:55:00Z
5
value 0.00083
scoring_system epss
scoring_elements 0.24326
published_at 2026-04-02T12:55:00Z
6
value 0.00083
scoring_system epss
scoring_elements 0.24359
published_at 2026-04-04T12:55:00Z
7
value 0.00083
scoring_system epss
scoring_elements 0.24142
published_at 2026-04-07T12:55:00Z
8
value 0.00083
scoring_system epss
scoring_elements 0.24208
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944333
reference_id 1944333
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944333
12
reference_url https://security.archlinux.org/ASA-202103-24
reference_id ASA-202103-24
reference_type
scores
url https://security.archlinux.org/ASA-202103-24
13
reference_url https://security.archlinux.org/ASA-202103-25
reference_id ASA-202103-25
reference_type
scores
url https://security.archlinux.org/ASA-202103-25
14
reference_url https://security.archlinux.org/AVG-1721
reference_id AVG-1721
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1721
15
reference_url https://security.archlinux.org/AVG-1722
reference_id AVG-1722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1722
16
reference_url https://security.gentoo.org/glsa/202104-03
reference_id GLSA-202104-03
reference_type
scores
url https://security.gentoo.org/glsa/202104-03
17
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/4894-1/
reference_id USN-4894-1
reference_type
scores
url https://usn.ubuntu.com/4894-1/
fixed_packages
aliases CVE-2021-1765
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e1rg-8a3d-z7a5
104
url VCID-e5f7-5sx3-27b1
vulnerability_id VCID-e5f7-5sx3-27b1
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42916.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42916
reference_id
reference_type
scores
0
value 0.00047
scoring_system epss
scoring_elements 0.14646
published_at 2026-04-13T12:55:00Z
1
value 0.00047
scoring_system epss
scoring_elements 0.14571
published_at 2026-04-02T12:55:00Z
2
value 0.00047
scoring_system epss
scoring_elements 0.147
published_at 2026-04-12T12:55:00Z
3
value 0.00047
scoring_system epss
scoring_elements 0.14738
published_at 2026-04-11T12:55:00Z
4
value 0.00047
scoring_system epss
scoring_elements 0.14593
published_at 2026-04-09T12:55:00Z
5
value 0.00047
scoring_system epss
scoring_elements 0.14451
published_at 2026-04-07T12:55:00Z
6
value 0.00047
scoring_system epss
scoring_elements 0.14641
published_at 2026-04-04T12:55:00Z
7
value 0.00047
scoring_system epss
scoring_elements 0.1454
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42916
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42916
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42917
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/12/05/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://www.openwall.com/lists/oss-security/2023/12/05/1
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
7
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2253054
reference_id 2253054
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2253054
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/3
reference_id 3
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/3
10
reference_url http://seclists.org/fulldisclosure/2024/Jan/35
reference_id 35
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2024/Jan/35
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/4
reference_id 4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/4
12
reference_url http://seclists.org/fulldisclosure/2023/Dec/5
reference_id 5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/5
13
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
reference_id AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/
15
reference_url https://www.debian.org/security/2023/dsa-5575
reference_id dsa-5575
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://www.debian.org/security/2023/dsa-5575
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://support.apple.com/en-us/HT214031
reference_id HT214031
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214031
18
reference_url https://support.apple.com/en-us/HT214032
reference_id HT214032
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214032
19
reference_url https://support.apple.com/en-us/HT214033
reference_id HT214033
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/en-us/HT214033
20
reference_url https://support.apple.com/kb/HT214033
reference_id HT214033
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214033
21
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214034
22
reference_url https://support.apple.com/kb/HT214062
reference_id HT214062
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://support.apple.com/kb/HT214062
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
reference_id P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2023-12-02T05:00:18Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/
24
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
25
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/6545-1/
reference_id USN-6545-1
reference_type
scores
url https://usn.ubuntu.com/6545-1/
fixed_packages
aliases CVE-2023-42916
risk_score 10.0
exploitability 2.0
weighted_severity 6.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e5f7-5sx3-27b1
105
url VCID-e695-3zce-rfay
vulnerability_id VCID-e695-3zce-rfay
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46691.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46691.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46691
reference_id
reference_type
scores
0
value 0.00408
scoring_system epss
scoring_elements 0.61159
published_at 2026-04-02T12:55:00Z
1
value 0.00408
scoring_system epss
scoring_elements 0.61205
published_at 2026-04-13T12:55:00Z
2
value 0.00408
scoring_system epss
scoring_elements 0.61187
published_at 2026-04-04T12:55:00Z
3
value 0.00408
scoring_system epss
scoring_elements 0.61153
published_at 2026-04-07T12:55:00Z
4
value 0.00408
scoring_system epss
scoring_elements 0.61201
published_at 2026-04-08T12:55:00Z
5
value 0.00408
scoring_system epss
scoring_elements 0.61216
published_at 2026-04-09T12:55:00Z
6
value 0.00408
scoring_system epss
scoring_elements 0.61236
published_at 2026-04-11T12:55:00Z
7
value 0.00408
scoring_system epss
scoring_elements 0.61223
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46691
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
8
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156990
reference_id 2156990
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156990
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213530
15
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213531
16
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213532
17
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213535
18
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213536
19
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T14:28:40Z/
url https://support.apple.com/en-us/HT213537
20
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
21
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-46691
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-e695-3zce-rfay
106
url VCID-ex1v-8bhw-5yfm
vulnerability_id VCID-ex1v-8bhw-5yfm
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32923.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32923.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32923
reference_id
reference_type
scores
0
value 0.00236
scoring_system epss
scoring_elements 0.46563
published_at 2026-04-04T12:55:00Z
1
value 0.00236
scoring_system epss
scoring_elements 0.46544
published_at 2026-04-02T12:55:00Z
2
value 0.00236
scoring_system epss
scoring_elements 0.46567
published_at 2026-04-09T12:55:00Z
3
value 0.00236
scoring_system epss
scoring_elements 0.46512
published_at 2026-04-07T12:55:00Z
4
value 0.00268
scoring_system epss
scoring_elements 0.50234
published_at 2026-04-13T12:55:00Z
5
value 0.00268
scoring_system epss
scoring_elements 0.50272
published_at 2026-04-11T12:55:00Z
6
value 0.00268
scoring_system epss
scoring_elements 0.50245
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32923
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140502
reference_id 2140502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140502
16
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213488
19
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213489
20
reference_url https://support.apple.com/en-us/HT213490
reference_id HT213490
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213490
21
reference_url https://support.apple.com/en-us/HT213491
reference_id HT213491
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213491
22
reference_url https://support.apple.com/en-us/HT213492
reference_id HT213492
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213492
23
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-06T03:26:29Z/
url https://support.apple.com/en-us/HT213495
24
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
25
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
aliases CVE-2022-32923
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ex1v-8bhw-5yfm
107
url VCID-ey9n-zksh-mbfm
vulnerability_id VCID-ey9n-zksh-mbfm
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31206.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31206
reference_id
reference_type
scores
0
value 0.01111
scoring_system epss
scoring_elements 0.78151
published_at 2026-04-13T12:55:00Z
1
value 0.01111
scoring_system epss
scoring_elements 0.78103
published_at 2026-04-02T12:55:00Z
2
value 0.01111
scoring_system epss
scoring_elements 0.78133
published_at 2026-04-04T12:55:00Z
3
value 0.01111
scoring_system epss
scoring_elements 0.78116
published_at 2026-04-07T12:55:00Z
4
value 0.01111
scoring_system epss
scoring_elements 0.78142
published_at 2026-04-08T12:55:00Z
5
value 0.01111
scoring_system epss
scoring_elements 0.78148
published_at 2026-04-09T12:55:00Z
6
value 0.01111
scoring_system epss
scoring_elements 0.78173
published_at 2026-04-11T12:55:00Z
7
value 0.01111
scoring_system epss
scoring_elements 0.78155
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31206
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31206
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122405
reference_id 122405
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122405
6
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122716
7
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122719
8
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122720
9
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122721
10
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T20:02:58Z/
url https://support.apple.com/en-us/122722
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366502
reference_id 2366502
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366502
12
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
13
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
14
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
15
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
19
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
20
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
21
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
aliases CVE-2025-31206
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ey9n-zksh-mbfm
108
url VCID-eydj-6sth-akgw
vulnerability_id VCID-eydj-6sth-akgw
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30294.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-30294.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2082544
reference_id 2082544
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2082544
3
reference_url https://security.archlinux.org/AVG-2758
reference_id AVG-2758
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2758
4
reference_url https://security.archlinux.org/AVG-2759
reference_id AVG-2759
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2759
5
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
6
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-30294
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eydj-6sth-akgw
109
url VCID-f4xf-wrqj-mqbj
vulnerability_id VCID-f4xf-wrqj-mqbj
summary webkitgtk: A website may able to track visited websites in private browsing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32933.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32933.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32933
reference_id
reference_type
scores
0
value 0.00209
scoring_system epss
scoring_elements 0.43357
published_at 2026-04-02T12:55:00Z
1
value 0.00209
scoring_system epss
scoring_elements 0.43362
published_at 2026-04-13T12:55:00Z
2
value 0.00209
scoring_system epss
scoring_elements 0.4339
published_at 2026-04-09T12:55:00Z
3
value 0.00209
scoring_system epss
scoring_elements 0.43409
published_at 2026-04-11T12:55:00Z
4
value 0.00209
scoring_system epss
scoring_elements 0.43377
published_at 2026-04-12T12:55:00Z
5
value 0.00209
scoring_system epss
scoring_elements 0.43384
published_at 2026-04-04T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43323
published_at 2026-04-07T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43375
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32933
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271441
reference_id 2271441
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271441
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-32933
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f4xf-wrqj-mqbj
110
url VCID-f8z1-mtxh-1bhz
vulnerability_id VCID-f8z1-mtxh-1bhz
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32359.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32359.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32359
reference_id
reference_type
scores
0
value 0.00099
scoring_system epss
scoring_elements 0.27686
published_at 2026-04-02T12:55:00Z
1
value 0.00099
scoring_system epss
scoring_elements 0.27724
published_at 2026-04-04T12:55:00Z
2
value 0.00099
scoring_system epss
scoring_elements 0.27514
published_at 2026-04-07T12:55:00Z
3
value 0.00099
scoring_system epss
scoring_elements 0.27583
published_at 2026-04-08T12:55:00Z
4
value 0.00099
scoring_system epss
scoring_elements 0.27625
published_at 2026-04-09T12:55:00Z
5
value 0.00099
scoring_system epss
scoring_elements 0.2763
published_at 2026-04-11T12:55:00Z
6
value 0.00099
scoring_system epss
scoring_elements 0.27586
published_at 2026-04-12T12:55:00Z
7
value 0.00099
scoring_system epss
scoring_elements 0.27529
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32359
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271449
reference_id 2271449
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271449
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
16
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-32359
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-f8z1-mtxh-1bhz
111
url VCID-feqc-qs1m-ube7
vulnerability_id VCID-feqc-qs1m-ube7
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30797.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30797.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30797
reference_id
reference_type
scores
0
value 0.00672
scoring_system epss
scoring_elements 0.7132
published_at 2026-04-07T12:55:00Z
1
value 0.00672
scoring_system epss
scoring_elements 0.71364
published_at 2026-04-13T12:55:00Z
2
value 0.00672
scoring_system epss
scoring_elements 0.71397
published_at 2026-04-11T12:55:00Z
3
value 0.00672
scoring_system epss
scoring_elements 0.71381
published_at 2026-04-12T12:55:00Z
4
value 0.00672
scoring_system epss
scoring_elements 0.71328
published_at 2026-04-02T12:55:00Z
5
value 0.00672
scoring_system epss
scoring_elements 0.71346
published_at 2026-04-04T12:55:00Z
6
value 0.00672
scoring_system epss
scoring_elements 0.71361
published_at 2026-04-08T12:55:00Z
7
value 0.00672
scoring_system epss
scoring_elements 0.71374
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30797
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986902
reference_id 1986902
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986902
16
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
17
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
18
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
19
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
20
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
21
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30797
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-feqc-qs1m-ube7
112
url VCID-fknw-h7xk-gkbt
vulnerability_id VCID-fknw-h7xk-gkbt
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42852.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42852
reference_id
reference_type
scores
0
value 0.00846
scoring_system epss
scoring_elements 0.7478
published_at 2026-04-02T12:55:00Z
1
value 0.00846
scoring_system epss
scoring_elements 0.74821
published_at 2026-04-13T12:55:00Z
2
value 0.00846
scoring_system epss
scoring_elements 0.74807
published_at 2026-04-04T12:55:00Z
3
value 0.00846
scoring_system epss
scoring_elements 0.74781
published_at 2026-04-07T12:55:00Z
4
value 0.00846
scoring_system epss
scoring_elements 0.74814
published_at 2026-04-08T12:55:00Z
5
value 0.00846
scoring_system epss
scoring_elements 0.74828
published_at 2026-04-09T12:55:00Z
6
value 0.00846
scoring_system epss
scoring_elements 0.74852
published_at 2026-04-11T12:55:00Z
7
value 0.00846
scoring_system epss
scoring_elements 0.74831
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156986
reference_id 2156986
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156986
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
15
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
16
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://security.gentoo.org/glsa/202305-32
17
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213530
18
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213531
19
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213532
20
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213535
21
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213536
22
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:59:38Z/
url https://support.apple.com/en-us/HT213537
23
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
24
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-42852
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fknw-h7xk-gkbt
113
url VCID-fpag-gk3v-bfhq
vulnerability_id VCID-fpag-gk3v-bfhq
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22662.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22662.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22662
reference_id
reference_type
scores
0
value 0.00223
scoring_system epss
scoring_elements 0.44948
published_at 2026-04-13T12:55:00Z
1
value 0.00223
scoring_system epss
scoring_elements 0.44956
published_at 2026-04-09T12:55:00Z
2
value 0.00223
scoring_system epss
scoring_elements 0.44977
published_at 2026-04-11T12:55:00Z
3
value 0.00223
scoring_system epss
scoring_elements 0.44945
published_at 2026-04-12T12:55:00Z
4
value 0.00223
scoring_system epss
scoring_elements 0.44941
published_at 2026-04-02T12:55:00Z
5
value 0.00223
scoring_system epss
scoring_elements 0.44962
published_at 2026-04-04T12:55:00Z
6
value 0.00223
scoring_system epss
scoring_elements 0.44903
published_at 2026-04-07T12:55:00Z
7
value 0.00223
scoring_system epss
scoring_elements 0.44955
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22662
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2104787
reference_id 2104787
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2104787
8
reference_url https://security.archlinux.org/AVG-2779
reference_id AVG-2779
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2779
9
reference_url https://security.archlinux.org/AVG-2780
reference_id AVG-2780
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2780
10
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
11
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
12
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-22662
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fpag-gk3v-bfhq
114
url VCID-fzqz-yfn1-7yfd
vulnerability_id VCID-fzqz-yfn1-7yfd
summary webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31257.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31257
reference_id
reference_type
scores
0
value 0.00799
scoring_system epss
scoring_elements 0.7403
published_at 2026-04-13T12:55:00Z
1
value 0.00799
scoring_system epss
scoring_elements 0.73989
published_at 2026-04-02T12:55:00Z
2
value 0.00799
scoring_system epss
scoring_elements 0.74015
published_at 2026-04-04T12:55:00Z
3
value 0.00799
scoring_system epss
scoring_elements 0.73986
published_at 2026-04-07T12:55:00Z
4
value 0.00799
scoring_system epss
scoring_elements 0.7402
published_at 2026-04-08T12:55:00Z
5
value 0.00799
scoring_system epss
scoring_elements 0.74034
published_at 2026-04-09T12:55:00Z
6
value 0.00799
scoring_system epss
scoring_elements 0.74056
published_at 2026-04-11T12:55:00Z
7
value 0.00799
scoring_system epss
scoring_elements 0.74037
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31257
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31257
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:31:38Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366504
reference_id 2366504
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366504
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://access.redhat.com/errata/RHSA-2025:7995
reference_id RHSA-2025:7995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7995
17
reference_url https://access.redhat.com/errata/RHSA-2025:8046
reference_id RHSA-2025:8046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8046
18
reference_url https://access.redhat.com/errata/RHSA-2025:8530
reference_id RHSA-2025:8530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8530
19
reference_url https://access.redhat.com/errata/RHSA-2025:8532
reference_id RHSA-2025:8532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8532
20
reference_url https://access.redhat.com/errata/RHSA-2025:8533
reference_id RHSA-2025:8533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8533
21
reference_url https://access.redhat.com/errata/RHSA-2025:8534
reference_id RHSA-2025:8534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8534
22
reference_url https://access.redhat.com/errata/RHSA-2025:8541
reference_id RHSA-2025:8541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8541
23
reference_url https://access.redhat.com/errata/RHSA-2025:8600
reference_id RHSA-2025:8600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8600
24
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
aliases CVE-2025-31257
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-fzqz-yfn1-7yfd
115
url VCID-g2uh-tzx9-bqc7
vulnerability_id VCID-g2uh-tzx9-bqc7
summary webkitgtk: Processing web content may lead to a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54658.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54658
reference_id
reference_type
scores
0
value 0.00181
scoring_system epss
scoring_elements 0.39859
published_at 2026-04-02T12:55:00Z
1
value 0.00181
scoring_system epss
scoring_elements 0.39882
published_at 2026-04-04T12:55:00Z
2
value 0.00186
scoring_system epss
scoring_elements 0.40467
published_at 2026-04-08T12:55:00Z
3
value 0.00186
scoring_system epss
scoring_elements 0.40416
published_at 2026-04-07T12:55:00Z
4
value 0.00217
scoring_system epss
scoring_elements 0.4428
published_at 2026-04-13T12:55:00Z
5
value 0.00217
scoring_system epss
scoring_elements 0.44295
published_at 2026-04-09T12:55:00Z
6
value 0.00217
scoring_system epss
scoring_elements 0.44313
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54658
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120881
13
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120882
14
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120883
15
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120893
16
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120894
17
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-02-11T15:01:02Z/
url https://support.apple.com/en-us/120895
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344946
reference_id 2344946
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344946
19
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
20
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-54658
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g2uh-tzx9-bqc7
116
url VCID-g4ct-k4dv-s7fs
vulnerability_id VCID-g4ct-k4dv-s7fs
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32393.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32393
reference_id
reference_type
scores
0
value 0.00237
scoring_system epss
scoring_elements 0.4681
published_at 2026-04-02T12:55:00Z
1
value 0.00237
scoring_system epss
scoring_elements 0.46829
published_at 2026-04-04T12:55:00Z
2
value 0.00237
scoring_system epss
scoring_elements 0.46778
published_at 2026-04-07T12:55:00Z
3
value 0.00237
scoring_system epss
scoring_elements 0.46833
published_at 2026-04-08T12:55:00Z
4
value 0.00237
scoring_system epss
scoring_elements 0.46832
published_at 2026-04-09T12:55:00Z
5
value 0.00237
scoring_system epss
scoring_elements 0.46855
published_at 2026-04-11T12:55:00Z
6
value 0.00237
scoring_system epss
scoring_elements 0.46827
published_at 2026-04-12T12:55:00Z
7
value 0.00237
scoring_system epss
scoring_elements 0.46834
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32393
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2224608
reference_id 2224608
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2224608
14
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
15
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
16
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
aliases CVE-2023-32393
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-g4ct-k4dv-s7fs
117
url VCID-gaxq-59p5-fufx
vulnerability_id VCID-gaxq-59p5-fufx
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26716.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26716.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26716
reference_id
reference_type
scores
0
value 0.00139
scoring_system epss
scoring_elements 0.34135
published_at 2026-04-04T12:55:00Z
1
value 0.00139
scoring_system epss
scoring_elements 0.34069
published_at 2026-04-09T12:55:00Z
2
value 0.00139
scoring_system epss
scoring_elements 0.34038
published_at 2026-04-08T12:55:00Z
3
value 0.00139
scoring_system epss
scoring_elements 0.34104
published_at 2026-04-02T12:55:00Z
4
value 0.00139
scoring_system epss
scoring_elements 0.33995
published_at 2026-04-07T12:55:00Z
5
value 0.00176
scoring_system epss
scoring_elements 0.39092
published_at 2026-04-13T12:55:00Z
6
value 0.00176
scoring_system epss
scoring_elements 0.39149
published_at 2026-04-11T12:55:00Z
7
value 0.00176
scoring_system epss
scoring_elements 0.39111
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26716
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092734
reference_id 2092734
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092734
10
reference_url https://security.archlinux.org/AVG-2758
reference_id AVG-2758
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2758
11
reference_url https://security.archlinux.org/AVG-2759
reference_id AVG-2759
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2759
12
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
13
reference_url https://support.apple.com/en-us/HT213253
reference_id HT213253
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/
url https://support.apple.com/en-us/HT213253
14
reference_url https://support.apple.com/en-us/HT213254
reference_id HT213254
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/
url https://support.apple.com/en-us/HT213254
15
reference_url https://support.apple.com/en-us/HT213257
reference_id HT213257
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/
url https://support.apple.com/en-us/HT213257
16
reference_url https://support.apple.com/en-us/HT213258
reference_id HT213258
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/
url https://support.apple.com/en-us/HT213258
17
reference_url https://support.apple.com/en-us/HT213260
reference_id HT213260
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:23:35Z/
url https://support.apple.com/en-us/HT213260
18
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
19
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/5457-1/
reference_id USN-5457-1
reference_type
scores
url https://usn.ubuntu.com/5457-1/
fixed_packages
aliases CVE-2022-26716
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gaxq-59p5-fufx
118
url VCID-gf1x-4snz-fbfv
vulnerability_id VCID-gf1x-4snz-fbfv
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42762.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-42762.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-42762
reference_id
reference_type
scores
0
value 9e-05
scoring_system epss
scoring_elements 0.00837
published_at 2026-04-01T12:55:00Z
1
value 9e-05
scoring_system epss
scoring_elements 0.00834
published_at 2026-04-13T12:55:00Z
2
value 9e-05
scoring_system epss
scoring_elements 0.00849
published_at 2026-04-09T12:55:00Z
3
value 9e-05
scoring_system epss
scoring_elements 0.00839
published_at 2026-04-11T12:55:00Z
4
value 9e-05
scoring_system epss
scoring_elements 0.00833
published_at 2026-04-12T12:55:00Z
5
value 9e-05
scoring_system epss
scoring_elements 0.00843
published_at 2026-04-02T12:55:00Z
6
value 9e-05
scoring_system epss
scoring_elements 0.00844
published_at 2026-04-04T12:55:00Z
7
value 9e-05
scoring_system epss
scoring_elements 0.00847
published_at 2026-04-07T12:55:00Z
8
value 9e-05
scoring_system epss
scoring_elements 0.00851
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-42762
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2016673
reference_id 2016673
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2016673
14
reference_url https://security.archlinux.org/ASA-202110-10
reference_id ASA-202110-10
reference_type
scores
url https://security.archlinux.org/ASA-202110-10
15
reference_url https://security.archlinux.org/ASA-202110-9
reference_id ASA-202110-9
reference_type
scores
url https://security.archlinux.org/ASA-202110-9
16
reference_url https://security.archlinux.org/AVG-2483
reference_id AVG-2483
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2483
17
reference_url https://security.archlinux.org/AVG-2484
reference_id AVG-2484
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2484
18
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/5127-1/
reference_id USN-5127-1
reference_type
scores
url https://usn.ubuntu.com/5127-1/
fixed_packages
aliases CVE-2021-42762
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gf1x-4snz-fbfv
119
url VCID-gjvy-329h-dkgp
vulnerability_id VCID-gjvy-329h-dkgp
summary webkitgtk: A maliciously crafted webpage may be able to fingerprint the user
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27838.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27838.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27838
reference_id
reference_type
scores
0
value 0.0089
scoring_system epss
scoring_elements 0.75521
published_at 2026-04-13T12:55:00Z
1
value 0.0089
scoring_system epss
scoring_elements 0.755
published_at 2026-04-04T12:55:00Z
2
value 0.0089
scoring_system epss
scoring_elements 0.7548
published_at 2026-04-07T12:55:00Z
3
value 0.0089
scoring_system epss
scoring_elements 0.75522
published_at 2026-04-08T12:55:00Z
4
value 0.0089
scoring_system epss
scoring_elements 0.75532
published_at 2026-04-09T12:55:00Z
5
value 0.0089
scoring_system epss
scoring_elements 0.75551
published_at 2026-04-11T12:55:00Z
6
value 0.0089
scoring_system epss
scoring_elements 0.7553
published_at 2026-04-12T12:55:00Z
7
value 0.01346
scoring_system epss
scoring_elements 0.80031
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27838
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27838
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120896
5
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120898
6
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120901
7
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120902
8
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120903
9
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120905
10
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/120906
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314702
reference_id 2314702
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314702
12
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
13
reference_url https://support.apple.com/en-us/HT214100
reference_id HT214100
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214100
14
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214101
15
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214102
16
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214103
17
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214104
18
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214106
19
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-19T14:48:32Z/
url https://support.apple.com/en-us/HT214108
20
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
21
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-27838
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gjvy-329h-dkgp
120
url VCID-gn1n-fjzp-hqe2
vulnerability_id VCID-gn1n-fjzp-hqe2
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-43010.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-43010
reference_id
reference_type
scores
0
value 0.00046
scoring_system epss
scoring_elements 0.1427
published_at 2026-04-12T12:55:00Z
1
value 0.00046
scoring_system epss
scoring_elements 0.14354
published_at 2026-04-02T12:55:00Z
2
value 0.00046
scoring_system epss
scoring_elements 0.14309
published_at 2026-04-11T12:55:00Z
3
value 0.00046
scoring_system epss
scoring_elements 0.14362
published_at 2026-04-09T12:55:00Z
4
value 0.00046
scoring_system epss
scoring_elements 0.14308
published_at 2026-04-08T12:55:00Z
5
value 0.00046
scoring_system epss
scoring_elements 0.14418
published_at 2026-04-04T12:55:00Z
6
value 0.00046
scoring_system epss
scoring_elements 0.14225
published_at 2026-04-07T12:55:00Z
7
value 0.0005
scoring_system epss
scoring_elements 0.15601
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-43010
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://support.apple.com/en-us/120300
reference_id 120300
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/120300
13
reference_url https://support.apple.com/en-us/120877
reference_id 120877
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/120877
14
reference_url https://support.apple.com/en-us/120879
reference_id 120879
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/120879
15
reference_url https://support.apple.com/en-us/126632
reference_id 126632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/126632
16
reference_url https://support.apple.com/en-us/126646
reference_id 126646
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-03-12T13:58:02Z/
url https://support.apple.com/en-us/126646
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2448778
reference_id 2448778
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2448778
18
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
19
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
22
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
23
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
24
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
25
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
26
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-43010
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-gn1n-fjzp-hqe2
121
url VCID-h7uu-gj11-a3er
vulnerability_id VCID-h7uu-gj11-a3er
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23263.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23263.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23263
reference_id
reference_type
scores
0
value 0.00618
scoring_system epss
scoring_elements 0.69912
published_at 2026-04-02T12:55:00Z
1
value 0.0062
scoring_system epss
scoring_elements 0.70044
published_at 2026-04-12T12:55:00Z
2
value 0.0062
scoring_system epss
scoring_elements 0.7006
published_at 2026-04-11T12:55:00Z
3
value 0.0062
scoring_system epss
scoring_elements 0.70036
published_at 2026-04-09T12:55:00Z
4
value 0.0062
scoring_system epss
scoring_elements 0.7002
published_at 2026-04-08T12:55:00Z
5
value 0.0062
scoring_system epss
scoring_elements 0.69996
published_at 2026-04-04T12:55:00Z
6
value 0.0062
scoring_system epss
scoring_elements 0.69972
published_at 2026-04-07T12:55:00Z
7
value 0.0062
scoring_system epss
scoring_elements 0.70031
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23263
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120880
reference_id 120880
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120880
14
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120881
15
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120882
16
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120883
17
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120893
18
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120894
19
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/120895
20
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
21
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270290
reference_id 2270290
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270290
22
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
23
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
24
reference_url http://seclists.org/fulldisclosure/2024/Mar/26
reference_id 26
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url http://seclists.org/fulldisclosure/2024/Mar/26
25
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
reference_id AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AO4BNNL5X2LQBJ6WX7VT4SGMA6R7DUU5/
26
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
reference_id BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BAIPBVDQV3GHMSNSZNEJCRZEPM7BEYGF/
27
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
28
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214081
29
reference_url https://support.apple.com/en-us/HT214082
reference_id HT214082
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214082
30
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214084
31
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214086
32
reference_url https://support.apple.com/en-us/HT214087
reference_id HT214087
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214087
33
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214088
34
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://support.apple.com/en-us/HT214089
35
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
36
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
reference_id PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-18T04:00:44Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PXORDRCSQAQU436W4S2Z3X5B5PDXL3LI/
37
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
38
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
39
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
40
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
aliases CVE-2024-23263
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-h7uu-gj11-a3er
122
url VCID-hgwz-tyjg-r7h8
vulnerability_id VCID-hgwz-tyjg-r7h8
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29623.json
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-29623.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-29623
reference_id
reference_type
scores
0
value 0.00033
scoring_system epss
scoring_elements 0.09361
published_at 2026-04-01T12:55:00Z
1
value 0.00033
scoring_system epss
scoring_elements 0.09416
published_at 2026-04-13T12:55:00Z
2
value 0.00033
scoring_system epss
scoring_elements 0.09445
published_at 2026-04-09T12:55:00Z
3
value 0.00033
scoring_system epss
scoring_elements 0.09458
published_at 2026-04-11T12:55:00Z
4
value 0.00033
scoring_system epss
scoring_elements 0.09431
published_at 2026-04-12T12:55:00Z
5
value 0.00033
scoring_system epss
scoring_elements 0.09362
published_at 2026-04-02T12:55:00Z
6
value 0.00033
scoring_system epss
scoring_elements 0.09412
published_at 2026-04-04T12:55:00Z
7
value 0.00033
scoring_system epss
scoring_elements 0.09323
published_at 2026-04-07T12:55:00Z
8
value 0.00033
scoring_system epss
scoring_elements 0.09397
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-29623
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 3.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944329
reference_id 1944329
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944329
12
reference_url https://security.archlinux.org/ASA-202103-24
reference_id ASA-202103-24
reference_type
scores
url https://security.archlinux.org/ASA-202103-24
13
reference_url https://security.archlinux.org/ASA-202103-25
reference_id ASA-202103-25
reference_type
scores
url https://security.archlinux.org/ASA-202103-25
14
reference_url https://security.archlinux.org/AVG-1721
reference_id AVG-1721
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1721
15
reference_url https://security.archlinux.org/AVG-1722
reference_id AVG-1722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1722
16
reference_url https://security.gentoo.org/glsa/202104-03
reference_id GLSA-202104-03
reference_type
scores
url https://security.gentoo.org/glsa/202104-03
17
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/4894-1/
reference_id USN-4894-1
reference_type
scores
url https://usn.ubuntu.com/4894-1/
fixed_packages
aliases CVE-2020-29623
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hgwz-tyjg-r7h8
123
url VCID-hp6k-spzk-vbaa
vulnerability_id VCID-hp6k-spzk-vbaa
summary webkitgtk: Copying a URL from Web Inspector may lead to command injection
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24150.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24150
reference_id
reference_type
scores
0
value 0.00308
scoring_system epss
scoring_elements 0.53944
published_at 2026-04-02T12:55:00Z
1
value 0.00308
scoring_system epss
scoring_elements 0.5401
published_at 2026-04-13T12:55:00Z
2
value 0.00308
scoring_system epss
scoring_elements 0.53971
published_at 2026-04-04T12:55:00Z
3
value 0.00308
scoring_system epss
scoring_elements 0.53947
published_at 2026-04-07T12:55:00Z
4
value 0.00308
scoring_system epss
scoring_elements 0.53999
published_at 2026-04-08T12:55:00Z
5
value 0.00308
scoring_system epss
scoring_elements 0.53998
published_at 2026-04-09T12:55:00Z
6
value 0.00308
scoring_system epss
scoring_elements 0.54045
published_at 2026-04-11T12:55:00Z
7
value 0.00308
scoring_system epss
scoring_elements 0.54028
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24150
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24150
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-02-05T15:28:31Z/
url https://support.apple.com/en-us/122074
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344622
reference_id 2344622
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344622
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
10
reference_url https://access.redhat.com/errata/RHSA-2025:2125
reference_id RHSA-2025:2125
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2125
11
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
aliases CVE-2025-24150
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hp6k-spzk-vbaa
124
url VCID-hshv-d587-73b9
vulnerability_id VCID-hshv-d587-73b9
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22589.json
reference_id
reference_type
scores
0
value 7.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22589.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22589
reference_id
reference_type
scores
0
value 0.00788
scoring_system epss
scoring_elements 0.73803
published_at 2026-04-02T12:55:00Z
1
value 0.00788
scoring_system epss
scoring_elements 0.73827
published_at 2026-04-04T12:55:00Z
2
value 0.00788
scoring_system epss
scoring_elements 0.73797
published_at 2026-04-07T12:55:00Z
3
value 0.00788
scoring_system epss
scoring_elements 0.73832
published_at 2026-04-08T12:55:00Z
4
value 0.00788
scoring_system epss
scoring_elements 0.73844
published_at 2026-04-09T12:55:00Z
5
value 0.00788
scoring_system epss
scoring_elements 0.73867
published_at 2026-04-11T12:55:00Z
6
value 0.00788
scoring_system epss
scoring_elements 0.73848
published_at 2026-04-12T12:55:00Z
7
value 0.00788
scoring_system epss
scoring_elements 0.7384
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22589
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053179
reference_id 2053179
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053179
8
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
9
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
10
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
11
reference_url https://usn.ubuntu.com/5306-1/
reference_id USN-5306-1
reference_type
scores
url https://usn.ubuntu.com/5306-1/
fixed_packages
aliases CVE-2022-22589
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hshv-d587-73b9
125
url VCID-hye4-wr18-5fbh
vulnerability_id VCID-hye4-wr18-5fbh
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46692.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46692.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46692
reference_id
reference_type
scores
0
value 0.00014
scoring_system epss
scoring_elements 0.02411
published_at 2026-04-02T12:55:00Z
1
value 0.00014
scoring_system epss
scoring_elements 0.02415
published_at 2026-04-13T12:55:00Z
2
value 0.00014
scoring_system epss
scoring_elements 0.02422
published_at 2026-04-04T12:55:00Z
3
value 0.00014
scoring_system epss
scoring_elements 0.0242
published_at 2026-04-07T12:55:00Z
4
value 0.00014
scoring_system epss
scoring_elements 0.02424
published_at 2026-04-11T12:55:00Z
5
value 0.00014
scoring_system epss
scoring_elements 0.02445
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46692
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url http://seclists.org/fulldisclosure/2022/Dec/21
reference_id 21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/21
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156991
reference_id 2156991
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156991
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213531
reference_id HT213531
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213531
18
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213532
19
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213535
20
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213536
21
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213537
22
reference_url https://support.apple.com/en-us/HT213538
reference_id HT213538
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T14:27:01Z/
url https://support.apple.com/en-us/HT213538
23
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
24
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-46692
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-hye4-wr18-5fbh
126
url VCID-j6q2-urw5-nffz
vulnerability_id VCID-j6q2-urw5-nffz
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1870.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1870.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1870
reference_id
reference_type
scores
0
value 0.01151
scoring_system epss
scoring_elements 0.78442
published_at 2026-04-01T12:55:00Z
1
value 0.01151
scoring_system epss
scoring_elements 0.78492
published_at 2026-04-13T12:55:00Z
2
value 0.01151
scoring_system epss
scoring_elements 0.78448
published_at 2026-04-02T12:55:00Z
3
value 0.01151
scoring_system epss
scoring_elements 0.78479
published_at 2026-04-04T12:55:00Z
4
value 0.01151
scoring_system epss
scoring_elements 0.78462
published_at 2026-04-07T12:55:00Z
5
value 0.01151
scoring_system epss
scoring_elements 0.78489
published_at 2026-04-08T12:55:00Z
6
value 0.01151
scoring_system epss
scoring_elements 0.78494
published_at 2026-04-09T12:55:00Z
7
value 0.01151
scoring_system epss
scoring_elements 0.78519
published_at 2026-04-11T12:55:00Z
8
value 0.01151
scoring_system epss
scoring_elements 0.785
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1870
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944350
reference_id 1944350
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944350
12
reference_url https://security.archlinux.org/ASA-202103-24
reference_id ASA-202103-24
reference_type
scores
url https://security.archlinux.org/ASA-202103-24
13
reference_url https://security.archlinux.org/ASA-202103-25
reference_id ASA-202103-25
reference_type
scores
url https://security.archlinux.org/ASA-202103-25
14
reference_url https://security.archlinux.org/AVG-1721
reference_id AVG-1721
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1721
15
reference_url https://security.archlinux.org/AVG-1722
reference_id AVG-1722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1722
16
reference_url https://security.gentoo.org/glsa/202104-03
reference_id GLSA-202104-03
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/
url https://security.gentoo.org/glsa/202104-03
17
reference_url https://support.apple.com/en-us/HT212146
reference_id HT212146
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/
url https://support.apple.com/en-us/HT212146
18
reference_url https://support.apple.com/en-us/HT212147
reference_id HT212147
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/
url https://support.apple.com/en-us/HT212147
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/
reference_id JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/
20
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/
reference_id L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:34:00Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/
21
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/4894-1/
reference_id USN-4894-1
reference_type
scores
url https://usn.ubuntu.com/4894-1/
fixed_packages
aliases CVE-2021-1870
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j6q2-urw5-nffz
127
url VCID-j8rg-9sya-8qbm
vulnerability_id VCID-j8rg-9sya-8qbm
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30890.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30890
reference_id
reference_type
scores
0
value 0.00191
scoring_system epss
scoring_elements 0.41001
published_at 2026-04-01T12:55:00Z
1
value 0.00191
scoring_system epss
scoring_elements 0.41083
published_at 2026-04-12T12:55:00Z
2
value 0.00191
scoring_system epss
scoring_elements 0.41114
published_at 2026-04-04T12:55:00Z
3
value 0.00191
scoring_system epss
scoring_elements 0.41041
published_at 2026-04-07T12:55:00Z
4
value 0.00191
scoring_system epss
scoring_elements 0.4109
published_at 2026-04-08T12:55:00Z
5
value 0.00191
scoring_system epss
scoring_elements 0.41097
published_at 2026-04-09T12:55:00Z
6
value 0.00191
scoring_system epss
scoring_elements 0.41117
published_at 2026-04-11T12:55:00Z
7
value 0.00191
scoring_system epss
scoring_elements 0.41066
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30890
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30887
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30890
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034389
reference_id 2034389
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034389
6
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
7
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
8
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
9
reference_url https://usn.ubuntu.com/5213-1/
reference_id USN-5213-1
reference_type
scores
url https://usn.ubuntu.com/5213-1/
fixed_packages
aliases CVE-2021-30890
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-j8rg-9sya-8qbm
128
url VCID-javw-gqjb-mfdt
vulnerability_id VCID-javw-gqjb-mfdt
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30849.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30849.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30849
reference_id
reference_type
scores
0
value 0.00257
scoring_system epss
scoring_elements 0.4898
published_at 2026-04-01T12:55:00Z
1
value 0.00257
scoring_system epss
scoring_elements 0.49038
published_at 2026-04-12T12:55:00Z
2
value 0.00257
scoring_system epss
scoring_elements 0.49051
published_at 2026-04-08T12:55:00Z
3
value 0.00257
scoring_system epss
scoring_elements 0.49048
published_at 2026-04-09T12:55:00Z
4
value 0.00257
scoring_system epss
scoring_elements 0.49065
published_at 2026-04-11T12:55:00Z
5
value 0.00257
scoring_system epss
scoring_elements 0.49016
published_at 2026-04-02T12:55:00Z
6
value 0.00257
scoring_system epss
scoring_elements 0.49044
published_at 2026-04-13T12:55:00Z
7
value 0.00257
scoring_system epss
scoring_elements 0.48997
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30849
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2017904
reference_id 2017904
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2017904
10
reference_url https://security.archlinux.org/AVG-2399
reference_id AVG-2399
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2399
11
reference_url https://security.archlinux.org/AVG-2400
reference_id AVG-2400
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2400
12
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30849
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-javw-gqjb-mfdt
129
url VCID-jdy8-m8nb-pbhu
vulnerability_id VCID-jdy8-m8nb-pbhu
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9983.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9983.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9983
reference_id
reference_type
scores
0
value 0.01301
scoring_system epss
scoring_elements 0.79676
published_at 2026-04-01T12:55:00Z
1
value 0.01301
scoring_system epss
scoring_elements 0.79725
published_at 2026-04-13T12:55:00Z
2
value 0.01301
scoring_system epss
scoring_elements 0.79747
published_at 2026-04-11T12:55:00Z
3
value 0.01301
scoring_system epss
scoring_elements 0.79731
published_at 2026-04-12T12:55:00Z
4
value 0.01301
scoring_system epss
scoring_elements 0.79683
published_at 2026-04-02T12:55:00Z
5
value 0.01301
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-04T12:55:00Z
6
value 0.01301
scoring_system epss
scoring_elements 0.7969
published_at 2026-04-07T12:55:00Z
7
value 0.01301
scoring_system epss
scoring_elements 0.79719
published_at 2026-04-08T12:55:00Z
8
value 0.01301
scoring_system epss
scoring_elements 0.79726
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9983
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901221
reference_id 1901221
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901221
15
reference_url https://security.archlinux.org/ASA-202011-28
reference_id ASA-202011-28
reference_type
scores
url https://security.archlinux.org/ASA-202011-28
16
reference_url https://security.archlinux.org/AVG-1291
reference_id AVG-1291
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1291
17
reference_url https://security.gentoo.org/glsa/202012-10
reference_id GLSA-202012-10
reference_type
scores
url https://security.gentoo.org/glsa/202012-10
18
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/4648-1/
reference_id USN-4648-1
reference_type
scores
url https://usn.ubuntu.com/4648-1/
fixed_packages
aliases CVE-2020-9983
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jdy8-m8nb-pbhu
130
url VCID-jrd5-1g2p-gyg7
vulnerability_id VCID-jrd5-1g2p-gyg7
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30936.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30936.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30936
reference_id
reference_type
scores
0
value 0.00887
scoring_system epss
scoring_elements 0.75403
published_at 2026-04-01T12:55:00Z
1
value 0.00887
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-02T12:55:00Z
2
value 0.00887
scoring_system epss
scoring_elements 0.75438
published_at 2026-04-04T12:55:00Z
3
value 0.00887
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-07T12:55:00Z
4
value 0.00887
scoring_system epss
scoring_elements 0.75462
published_at 2026-04-08T12:55:00Z
5
value 0.00887
scoring_system epss
scoring_elements 0.75471
published_at 2026-04-09T12:55:00Z
6
value 0.00887
scoring_system epss
scoring_elements 0.75491
published_at 2026-04-11T12:55:00Z
7
value 0.00887
scoring_system epss
scoring_elements 0.75469
published_at 2026-04-12T12:55:00Z
8
value 0.00887
scoring_system epss
scoring_elements 0.75459
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30936
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044528
reference_id 2044528
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044528
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30936
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jrd5-1g2p-gyg7
131
url VCID-jw1q-qa6v-kqct
vulnerability_id VCID-jw1q-qa6v-kqct
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21775.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-21775.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-21775
reference_id
reference_type
scores
0
value 0.00631
scoring_system epss
scoring_elements 0.70241
published_at 2026-04-01T12:55:00Z
1
value 0.00631
scoring_system epss
scoring_elements 0.70304
published_at 2026-04-13T12:55:00Z
2
value 0.00631
scoring_system epss
scoring_elements 0.70309
published_at 2026-04-09T12:55:00Z
3
value 0.00631
scoring_system epss
scoring_elements 0.70331
published_at 2026-04-11T12:55:00Z
4
value 0.00631
scoring_system epss
scoring_elements 0.70316
published_at 2026-04-12T12:55:00Z
5
value 0.00631
scoring_system epss
scoring_elements 0.70254
published_at 2026-04-02T12:55:00Z
6
value 0.00631
scoring_system epss
scoring_elements 0.70271
published_at 2026-04-04T12:55:00Z
7
value 0.00631
scoring_system epss
scoring_elements 0.70248
published_at 2026-04-07T12:55:00Z
8
value 0.00631
scoring_system epss
scoring_elements 0.70294
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-21775
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986863
reference_id 1986863
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986863
17
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
18
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
19
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
20
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
21
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
22
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-21775
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jw1q-qa6v-kqct
132
url VCID-k9zt-dc56-w7f8
vulnerability_id VCID-k9zt-dc56-w7f8
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1801.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1801.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1801
reference_id
reference_type
scores
0
value 0.00089
scoring_system epss
scoring_elements 0.25226
published_at 2026-04-13T12:55:00Z
1
value 0.00247
scoring_system epss
scoring_elements 0.47905
published_at 2026-04-01T12:55:00Z
2
value 0.00247
scoring_system epss
scoring_elements 0.4796
published_at 2026-04-09T12:55:00Z
3
value 0.00247
scoring_system epss
scoring_elements 0.47984
published_at 2026-04-11T12:55:00Z
4
value 0.00247
scoring_system epss
scoring_elements 0.47961
published_at 2026-04-12T12:55:00Z
5
value 0.00247
scoring_system epss
scoring_elements 0.47943
published_at 2026-04-02T12:55:00Z
6
value 0.00247
scoring_system epss
scoring_elements 0.47964
published_at 2026-04-04T12:55:00Z
7
value 0.00247
scoring_system epss
scoring_elements 0.47912
published_at 2026-04-07T12:55:00Z
8
value 0.00247
scoring_system epss
scoring_elements 0.47965
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1801
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944343
reference_id 1944343
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944343
12
reference_url https://security.archlinux.org/ASA-202103-24
reference_id ASA-202103-24
reference_type
scores
url https://security.archlinux.org/ASA-202103-24
13
reference_url https://security.archlinux.org/ASA-202103-25
reference_id ASA-202103-25
reference_type
scores
url https://security.archlinux.org/ASA-202103-25
14
reference_url https://security.archlinux.org/AVG-1721
reference_id AVG-1721
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1721
15
reference_url https://security.archlinux.org/AVG-1722
reference_id AVG-1722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1722
16
reference_url https://security.gentoo.org/glsa/202104-03
reference_id GLSA-202104-03
reference_type
scores
url https://security.gentoo.org/glsa/202104-03
17
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/4894-1/
reference_id USN-4894-1
reference_type
scores
url https://usn.ubuntu.com/4894-1/
fixed_packages
aliases CVE-2021-1801
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-k9zt-dc56-w7f8
133
url VCID-kbr6-94t1-87hd
vulnerability_id VCID-kbr6-94t1-87hd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-28198.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-28198
reference_id
reference_type
scores
0
value 0.00055
scoring_system epss
scoring_elements 0.17404
published_at 2026-04-02T12:55:00Z
1
value 0.00055
scoring_system epss
scoring_elements 0.17451
published_at 2026-04-04T12:55:00Z
2
value 0.00055
scoring_system epss
scoring_elements 0.17233
published_at 2026-04-07T12:55:00Z
3
value 0.00055
scoring_system epss
scoring_elements 0.17325
published_at 2026-04-08T12:55:00Z
4
value 0.00055
scoring_system epss
scoring_elements 0.17384
published_at 2026-04-09T12:55:00Z
5
value 0.00055
scoring_system epss
scoring_elements 0.17396
published_at 2026-04-11T12:55:00Z
6
value 0.00055
scoring_system epss
scoring_elements 0.17346
published_at 2026-04-12T12:55:00Z
7
value 0.00055
scoring_system epss
scoring_elements 0.17288
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-28198
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238943
reference_id 2238943
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238943
14
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-28198
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbr6-94t1-87hd
134
url VCID-kbzp-1gvm-b3ex
vulnerability_id VCID-kbzp-1gvm-b3ex
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40414.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40414.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40414
reference_id
reference_type
scores
0
value 0.00155
scoring_system epss
scoring_elements 0.36335
published_at 2026-04-02T12:55:00Z
1
value 0.00155
scoring_system epss
scoring_elements 0.36215
published_at 2026-04-13T12:55:00Z
2
value 0.00155
scoring_system epss
scoring_elements 0.36368
published_at 2026-04-04T12:55:00Z
3
value 0.00155
scoring_system epss
scoring_elements 0.36203
published_at 2026-04-07T12:55:00Z
4
value 0.00155
scoring_system epss
scoring_elements 0.36252
published_at 2026-04-08T12:55:00Z
5
value 0.00155
scoring_system epss
scoring_elements 0.36271
published_at 2026-04-09T12:55:00Z
6
value 0.00155
scoring_system epss
scoring_elements 0.36276
published_at 2026-04-11T12:55:00Z
7
value 0.00155
scoring_system epss
scoring_elements 0.36239
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40414
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270143
reference_id 2270143
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270143
14
reference_url http://www.openwall.com/lists/oss-security/2024/02/05/8
reference_id 8
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url http://www.openwall.com/lists/oss-security/2024/02/05/8
15
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
16
reference_url https://support.apple.com/en-us/HT213936
reference_id HT213936
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url https://support.apple.com/en-us/HT213936
17
reference_url https://support.apple.com/en-us/HT213937
reference_id HT213937
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url https://support.apple.com/en-us/HT213937
18
reference_url https://support.apple.com/en-us/HT213938
reference_id HT213938
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url https://support.apple.com/en-us/HT213938
19
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url https://support.apple.com/en-us/HT213940
20
reference_url https://support.apple.com/en-us/HT213941
reference_id HT213941
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-01-11T02:22:55Z/
url https://support.apple.com/en-us/HT213941
21
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
22
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-40414
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kbzp-1gvm-b3ex
135
url VCID-kdvu-rhgt-xqat
vulnerability_id VCID-kdvu-rhgt-xqat
summary webkitgtk: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24223.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24223
reference_id
reference_type
scores
0
value 0.0023
scoring_system epss
scoring_elements 0.45855
published_at 2026-04-13T12:55:00Z
1
value 0.0023
scoring_system epss
scoring_elements 0.45831
published_at 2026-04-02T12:55:00Z
2
value 0.0023
scoring_system epss
scoring_elements 0.45853
published_at 2026-04-04T12:55:00Z
3
value 0.0023
scoring_system epss
scoring_elements 0.45803
published_at 2026-04-07T12:55:00Z
4
value 0.0023
scoring_system epss
scoring_elements 0.45859
published_at 2026-04-08T12:55:00Z
5
value 0.0023
scoring_system epss
scoring_elements 0.45856
published_at 2026-04-09T12:55:00Z
6
value 0.0023
scoring_system epss
scoring_elements 0.45878
published_at 2026-04-11T12:55:00Z
7
value 0.0023
scoring_system epss
scoring_elements 0.45848
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24223
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24223
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-13T14:41:21Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366499
reference_id 2366499
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366499
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
16
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
17
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
aliases CVE-2025-24223
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kdvu-rhgt-xqat
136
url VCID-kj7n-3mny-wkgr
vulnerability_id VCID-kj7n-3mny-wkgr
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38592
reference_id
reference_type
scores
0
value 0.00583
scoring_system epss
scoring_elements 0.68968
published_at 2026-04-13T12:55:00Z
1
value 0.00583
scoring_system epss
scoring_elements 0.69012
published_at 2026-04-11T12:55:00Z
2
value 0.00583
scoring_system epss
scoring_elements 0.68998
published_at 2026-04-12T12:55:00Z
3
value 0.00727
scoring_system epss
scoring_elements 0.72599
published_at 2026-04-08T12:55:00Z
4
value 0.00727
scoring_system epss
scoring_elements 0.72611
published_at 2026-04-09T12:55:00Z
5
value 0.00727
scoring_system epss
scoring_elements 0.72568
published_at 2026-04-02T12:55:00Z
6
value 0.00727
scoring_system epss
scoring_elements 0.72585
published_at 2026-04-04T12:55:00Z
7
value 0.00727
scoring_system epss
scoring_elements 0.72561
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38592
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231017
reference_id 2231017
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231017
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38592
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kj7n-3mny-wkgr
137
url VCID-knds-dwjv-c3c4
vulnerability_id VCID-knds-dwjv-c3c4
summary webkitgtk: improper bounds checking leading to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48503.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-48503.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-48503
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.3691
published_at 2026-04-04T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36879
published_at 2026-04-02T12:55:00Z
2
value 0.0018
scoring_system epss
scoring_elements 0.39622
published_at 2026-04-13T12:55:00Z
3
value 0.0018
scoring_system epss
scoring_elements 0.39674
published_at 2026-04-11T12:55:00Z
4
value 0.0018
scoring_system epss
scoring_elements 0.39639
published_at 2026-04-12T12:55:00Z
5
value 0.00185
scoring_system epss
scoring_elements 0.40327
published_at 2026-04-09T12:55:00Z
6
value 0.00185
scoring_system epss
scoring_elements 0.40265
published_at 2026-04-07T12:55:00Z
7
value 0.00185
scoring_system epss
scoring_elements 0.40316
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-48503
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218623
reference_id 2218623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218623
16
reference_url https://support.apple.com/en-us/HT213340
reference_id HT213340
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/
url https://support.apple.com/en-us/HT213340
17
reference_url https://support.apple.com/en-us/HT213341
reference_id HT213341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/
url https://support.apple.com/en-us/HT213341
18
reference_url https://support.apple.com/en-us/HT213342
reference_id HT213342
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/
url https://support.apple.com/en-us/HT213342
19
reference_url https://support.apple.com/en-us/HT213346
reference_id HT213346
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-10-20T14:53:48Z/
url https://support.apple.com/en-us/HT213346
20
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
21
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
22
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
23
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
24
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-48503
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-knds-dwjv-c3c4
138
url VCID-kp4m-h6ua-h7dm
vulnerability_id VCID-kp4m-h6ua-h7dm
summary webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40776.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40776
reference_id
reference_type
scores
0
value 0.00348
scoring_system epss
scoring_elements 0.57349
published_at 2026-04-13T12:55:00Z
1
value 0.00378
scoring_system epss
scoring_elements 0.59363
published_at 2026-04-11T12:55:00Z
2
value 0.00378
scoring_system epss
scoring_elements 0.59344
published_at 2026-04-09T12:55:00Z
3
value 0.00378
scoring_system epss
scoring_elements 0.5933
published_at 2026-04-08T12:55:00Z
4
value 0.00378
scoring_system epss
scoring_elements 0.59316
published_at 2026-04-04T12:55:00Z
5
value 0.00378
scoring_system epss
scoring_elements 0.5928
published_at 2026-04-07T12:55:00Z
6
value 0.00378
scoring_system epss
scoring_elements 0.59346
published_at 2026-04-12T12:55:00Z
7
value 0.00441
scoring_system epss
scoring_elements 0.63204
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40776
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40776
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2301841
reference_id 2301841
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2301841
19
reference_url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
reference_id apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
20
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214116
21
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214117
22
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214119
23
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214121
24
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214122
25
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214123
26
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T13:33:50Z/
url https://support.apple.com/en-us/HT214124
27
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
31
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
32
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
33
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
34
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
aliases CVE-2024-40776
risk_score 2.6
exploitability 0.5
weighted_severity 5.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kp4m-h6ua-h7dm
139
url VCID-kshe-e6w9-37ez
vulnerability_id VCID-kshe-e6w9-37ez
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1844.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1844.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1844
reference_id
reference_type
scores
0
value 0.014
scoring_system epss
scoring_elements 0.80368
published_at 2026-04-01T12:55:00Z
1
value 0.014
scoring_system epss
scoring_elements 0.80419
published_at 2026-04-13T12:55:00Z
2
value 0.014
scoring_system epss
scoring_elements 0.80422
published_at 2026-04-09T12:55:00Z
3
value 0.014
scoring_system epss
scoring_elements 0.80441
published_at 2026-04-11T12:55:00Z
4
value 0.014
scoring_system epss
scoring_elements 0.80426
published_at 2026-04-12T12:55:00Z
5
value 0.014
scoring_system epss
scoring_elements 0.80374
published_at 2026-04-02T12:55:00Z
6
value 0.014
scoring_system epss
scoring_elements 0.80394
published_at 2026-04-04T12:55:00Z
7
value 0.014
scoring_system epss
scoring_elements 0.80383
published_at 2026-04-07T12:55:00Z
8
value 0.014
scoring_system epss
scoring_elements 0.80412
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1844
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944862
reference_id 1944862
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944862
8
reference_url https://security.archlinux.org/AVG-1744
reference_id AVG-1744
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1744
9
reference_url https://security.archlinux.org/AVG-1745
reference_id AVG-1745
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1745
10
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
11
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://usn.ubuntu.com/4939-1/
reference_id USN-4939-1
reference_type
scores
url https://usn.ubuntu.com/4939-1/
fixed_packages
aliases CVE-2021-1844
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kshe-e6w9-37ez
140
url VCID-ksq5-ygcp-nbaz
vulnerability_id VCID-ksq5-ygcp-nbaz
summary webkitgtk: A malicious website may exfiltrate data cross-origin
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-31205.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-31205
reference_id
reference_type
scores
0
value 0.00168
scoring_system epss
scoring_elements 0.37915
published_at 2026-04-13T12:55:00Z
1
value 0.00168
scoring_system epss
scoring_elements 0.37994
published_at 2026-04-02T12:55:00Z
2
value 0.00168
scoring_system epss
scoring_elements 0.38019
published_at 2026-04-04T12:55:00Z
3
value 0.00168
scoring_system epss
scoring_elements 0.37898
published_at 2026-04-07T12:55:00Z
4
value 0.00168
scoring_system epss
scoring_elements 0.37949
published_at 2026-04-08T12:55:00Z
5
value 0.00168
scoring_system epss
scoring_elements 0.37961
published_at 2026-04-09T12:55:00Z
6
value 0.00168
scoring_system epss
scoring_elements 0.37978
published_at 2026-04-11T12:55:00Z
7
value 0.00168
scoring_system epss
scoring_elements 0.3794
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-31205
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31205
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122404
reference_id 122404
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122404
5
reference_url https://support.apple.com/en-us/122716
reference_id 122716
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122716
6
reference_url https://support.apple.com/en-us/122719
reference_id 122719
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122719
7
reference_url https://support.apple.com/en-us/122720
reference_id 122720
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122720
8
reference_url https://support.apple.com/en-us/122721
reference_id 122721
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122721
9
reference_url https://support.apple.com/en-us/122722
reference_id 122722
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-13T15:33:25Z/
url https://support.apple.com/en-us/122722
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366501
reference_id 2366501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366501
11
reference_url https://security.archlinux.org/AVG-2863
reference_id AVG-2863
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2863
12
reference_url https://security.archlinux.org/AVG-2864
reference_id AVG-2864
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2864
13
reference_url https://security.archlinux.org/AVG-2865
reference_id AVG-2865
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2865
14
reference_url https://security.archlinux.org/AVG-2866
reference_id AVG-2866
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2866
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://access.redhat.com/errata/RHSA-2025:7995
reference_id RHSA-2025:7995
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7995
17
reference_url https://access.redhat.com/errata/RHSA-2025:8046
reference_id RHSA-2025:8046
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8046
18
reference_url https://access.redhat.com/errata/RHSA-2025:8530
reference_id RHSA-2025:8530
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8530
19
reference_url https://access.redhat.com/errata/RHSA-2025:8532
reference_id RHSA-2025:8532
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8532
20
reference_url https://access.redhat.com/errata/RHSA-2025:8533
reference_id RHSA-2025:8533
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8533
21
reference_url https://access.redhat.com/errata/RHSA-2025:8534
reference_id RHSA-2025:8534
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8534
22
reference_url https://access.redhat.com/errata/RHSA-2025:8541
reference_id RHSA-2025:8541
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8541
23
reference_url https://access.redhat.com/errata/RHSA-2025:8600
reference_id RHSA-2025:8600
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8600
24
reference_url https://usn.ubuntu.com/7566-1/
reference_id USN-7566-1
reference_type
scores
url https://usn.ubuntu.com/7566-1/
fixed_packages
aliases CVE-2025-31205
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ksq5-ygcp-nbaz
141
url VCID-kuyh-x3z4-q7gf
vulnerability_id VCID-kuyh-x3z4-q7gf
summary webkit: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54505.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54505
reference_id
reference_type
scores
0
value 0.00587
scoring_system epss
scoring_elements 0.69106
published_at 2026-04-13T12:55:00Z
1
value 0.00587
scoring_system epss
scoring_elements 0.69058
published_at 2026-04-02T12:55:00Z
2
value 0.00587
scoring_system epss
scoring_elements 0.69079
published_at 2026-04-04T12:55:00Z
3
value 0.00587
scoring_system epss
scoring_elements 0.6906
published_at 2026-04-07T12:55:00Z
4
value 0.00587
scoring_system epss
scoring_elements 0.6911
published_at 2026-04-08T12:55:00Z
5
value 0.00587
scoring_system epss
scoring_elements 0.69129
published_at 2026-04-09T12:55:00Z
6
value 0.00587
scoring_system epss
scoring_elements 0.69152
published_at 2026-04-11T12:55:00Z
7
value 0.00587
scoring_system epss
scoring_elements 0.69136
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54505
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54505
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121838
reference_id 121838
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121838
6
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121839
7
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121843
8
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121844
9
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121845
10
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-12-12T19:08:31Z/
url https://support.apple.com/en-us/121846
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333844
reference_id 2333844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333844
12
reference_url https://access.redhat.com/errata/RHSA-2025:0145
reference_id RHSA-2025:0145
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0145
13
reference_url https://access.redhat.com/errata/RHSA-2025:0146
reference_id RHSA-2025:0146
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0146
14
reference_url https://access.redhat.com/errata/RHSA-2025:0226
reference_id RHSA-2025:0226
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0226
15
reference_url https://access.redhat.com/errata/RHSA-2025:0276
reference_id RHSA-2025:0276
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0276
16
reference_url https://access.redhat.com/errata/RHSA-2025:0277
reference_id RHSA-2025:0277
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0277
17
reference_url https://access.redhat.com/errata/RHSA-2025:0278
reference_id RHSA-2025:0278
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0278
18
reference_url https://access.redhat.com/errata/RHSA-2025:0279
reference_id RHSA-2025:0279
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0279
19
reference_url https://access.redhat.com/errata/RHSA-2025:0282
reference_id RHSA-2025:0282
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0282
20
reference_url https://access.redhat.com/errata/RHSA-2025:0283
reference_id RHSA-2025:0283
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:0283
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7201-1/
reference_id USN-7201-1
reference_type
scores
url https://usn.ubuntu.com/7201-1/
fixed_packages
aliases CVE-2024-54505
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-kuyh-x3z4-q7gf
142
url VCID-ky87-8zpf-nqg2
vulnerability_id VCID-ky87-8zpf-nqg2
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-30427.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-30427
reference_id
reference_type
scores
0
value 0.01119
scoring_system epss
scoring_elements 0.78181
published_at 2026-04-02T12:55:00Z
1
value 0.01119
scoring_system epss
scoring_elements 0.7823
published_at 2026-04-13T12:55:00Z
2
value 0.01119
scoring_system epss
scoring_elements 0.78212
published_at 2026-04-04T12:55:00Z
3
value 0.01119
scoring_system epss
scoring_elements 0.78194
published_at 2026-04-07T12:55:00Z
4
value 0.01119
scoring_system epss
scoring_elements 0.7822
published_at 2026-04-08T12:55:00Z
5
value 0.01119
scoring_system epss
scoring_elements 0.78226
published_at 2026-04-09T12:55:00Z
6
value 0.01119
scoring_system epss
scoring_elements 0.78252
published_at 2026-04-11T12:55:00Z
7
value 0.01119
scoring_system epss
scoring_elements 0.78234
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-30427
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30427
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T13:18:38Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357919
reference_id 2357919
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357919
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
aliases CVE-2025-30427
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ky87-8zpf-nqg2
143
url VCID-m1q1-ma7s-63bd
vulnerability_id VCID-m1q1-ma7s-63bd
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30836.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30836.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30836
reference_id
reference_type
scores
0
value 0.00123
scoring_system epss
scoring_elements 0.31445
published_at 2026-04-01T12:55:00Z
1
value 0.00123
scoring_system epss
scoring_elements 0.3158
published_at 2026-04-02T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31623
published_at 2026-04-04T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31444
published_at 2026-04-07T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31496
published_at 2026-04-08T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31525
published_at 2026-04-09T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.3153
published_at 2026-04-11T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.31488
published_at 2026-04-12T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31451
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30836
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30809
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30836
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30848
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30849
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30858
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45482
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034376
reference_id 2034376
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034376
10
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
11
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30836
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-m1q1-ma7s-63bd
144
url VCID-ma6z-vrhf-mqdw
vulnerability_id VCID-ma6z-vrhf-mqdw
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42823.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42823
reference_id
reference_type
scores
0
value 0.00631
scoring_system epss
scoring_elements 0.70264
published_at 2026-04-04T12:55:00Z
1
value 0.00631
scoring_system epss
scoring_elements 0.70246
published_at 2026-04-02T12:55:00Z
2
value 0.00631
scoring_system epss
scoring_elements 0.70302
published_at 2026-04-09T12:55:00Z
3
value 0.00631
scoring_system epss
scoring_elements 0.70287
published_at 2026-04-08T12:55:00Z
4
value 0.00631
scoring_system epss
scoring_elements 0.7024
published_at 2026-04-07T12:55:00Z
5
value 0.00714
scoring_system epss
scoring_elements 0.72322
published_at 2026-04-13T12:55:00Z
6
value 0.00714
scoring_system epss
scoring_elements 0.7235
published_at 2026-04-11T12:55:00Z
7
value 0.00714
scoring_system epss
scoring_elements 0.72334
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140505
reference_id 2140505
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140505
8
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
reference_id 5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5LF4LYP725XZ7RWOPFUV6DGPN4Q5DUU4/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
reference_id AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AQKLEGJK3LHAKUQOLBHNR2DI3IUGLLTY/
11
reference_url https://www.debian.org/security/2022/dsa-5273
reference_id dsa-5273
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://www.debian.org/security/2022/dsa-5273
12
reference_url https://www.debian.org/security/2022/dsa-5274
reference_id dsa-5274
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://www.debian.org/security/2022/dsa-5274
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213488
15
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213489
16
reference_url https://support.apple.com/en-us/HT213491
reference_id HT213491
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213491
17
reference_url https://support.apple.com/en-us/HT213492
reference_id HT213492
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213492
18
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://support.apple.com/en-us/HT213495
19
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
reference_id JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JOFKX6BUEJFECSVFV6P5INQCOYQBB4NZ/
20
reference_url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
reference_id msg00010.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:33:41Z/
url https://lists.debian.org/debian-lts-announce/2022/11/msg00010.html
21
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
22
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
aliases CVE-2022-42823
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ma6z-vrhf-mqdw
145
url VCID-maw9-2k6n-wyea
vulnerability_id VCID-maw9-2k6n-wyea
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42826.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42826
reference_id
reference_type
scores
0
value 0.00101
scoring_system epss
scoring_elements 0.2786
published_at 2026-04-13T12:55:00Z
1
value 0.00101
scoring_system epss
scoring_elements 0.27852
published_at 2026-04-07T12:55:00Z
2
value 0.00101
scoring_system epss
scoring_elements 0.27919
published_at 2026-04-12T12:55:00Z
3
value 0.00101
scoring_system epss
scoring_elements 0.2796
published_at 2026-04-09T12:55:00Z
4
value 0.00101
scoring_system epss
scoring_elements 0.27962
published_at 2026-04-11T12:55:00Z
5
value 0.00104
scoring_system epss
scoring_elements 0.28491
published_at 2026-04-02T12:55:00Z
6
value 0.00104
scoring_system epss
scoring_elements 0.28534
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42826
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2167716
reference_id 2167716
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2167716
10
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://security.gentoo.org/glsa/202305-32
11
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://support.apple.com/en-us/HT213488
12
reference_url https://support.apple.com/en-us/HT213489
reference_id HT213489
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://support.apple.com/en-us/HT213489
13
reference_url https://support.apple.com/en-us/HT213495
reference_id HT213495
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-03-11T14:41:32Z/
url https://support.apple.com/en-us/HT213495
14
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
15
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/5867-1/
reference_id USN-5867-1
reference_type
scores
url https://usn.ubuntu.com/5867-1/
fixed_packages
aliases CVE-2022-42826
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-maw9-2k6n-wyea
146
url VCID-mch4-qacj-f7ey
vulnerability_id VCID-mch4-qacj-f7ey
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44192.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44192
reference_id
reference_type
scores
0
value 0.00188
scoring_system epss
scoring_elements 0.40741
published_at 2026-04-11T12:55:00Z
1
value 0.00188
scoring_system epss
scoring_elements 0.40715
published_at 2026-04-02T12:55:00Z
2
value 0.00188
scoring_system epss
scoring_elements 0.40717
published_at 2026-04-08T12:55:00Z
3
value 0.00188
scoring_system epss
scoring_elements 0.40667
published_at 2026-04-07T12:55:00Z
4
value 0.00188
scoring_system epss
scoring_elements 0.40743
published_at 2026-04-04T12:55:00Z
5
value 0.00188
scoring_system epss
scoring_elements 0.40723
published_at 2026-04-09T12:55:00Z
6
value 0.00209
scoring_system epss
scoring_elements 0.43342
published_at 2026-04-13T12:55:00Z
7
value 0.00209
scoring_system epss
scoring_elements 0.43358
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44192
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44192
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121240
reference_id 121240
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121240
6
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121241
7
reference_url https://support.apple.com/en-us/121248
reference_id 121248
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121248
8
reference_url https://support.apple.com/en-us/121249
reference_id 121249
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121249
9
reference_url https://support.apple.com/en-us/121250
reference_id 121250
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T13:35:26Z/
url https://support.apple.com/en-us/121250
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2353871
reference_id 2353871
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2353871
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7395-1/
reference_id USN-7395-1
reference_type
scores
url https://usn.ubuntu.com/7395-1/
fixed_packages
aliases CVE-2024-44192
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mch4-qacj-f7ey
147
url VCID-mepa-3qeb-1fd6
vulnerability_id VCID-mepa-3qeb-1fd6
summary webkitgtk: Visiting a malicious website may lead to address bar spoofing.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46725.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46725.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46725
reference_id
reference_type
scores
0
value 0.00058
scoring_system epss
scoring_elements 0.18367
published_at 2026-04-02T12:55:00Z
1
value 0.00058
scoring_system epss
scoring_elements 0.18422
published_at 2026-04-04T12:55:00Z
2
value 0.00058
scoring_system epss
scoring_elements 0.18126
published_at 2026-04-07T12:55:00Z
3
value 0.00058
scoring_system epss
scoring_elements 0.1821
published_at 2026-04-08T12:55:00Z
4
value 0.00058
scoring_system epss
scoring_elements 0.18264
published_at 2026-04-09T12:55:00Z
5
value 0.00058
scoring_system epss
scoring_elements 0.18266
published_at 2026-04-11T12:55:00Z
6
value 0.00058
scoring_system epss
scoring_elements 0.18219
published_at 2026-04-12T12:55:00Z
7
value 0.00058
scoring_system epss
scoring_elements 0.18168
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46725
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271446
reference_id 2271446
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271446
10
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
11
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-46725
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mepa-3qeb-1fd6
148
url VCID-mfvu-9zv4-k3gq
vulnerability_id VCID-mfvu-9zv4-k3gq
summary webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32919.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32919.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32919
reference_id
reference_type
scores
0
value 0.00071
scoring_system epss
scoring_elements 0.21778
published_at 2026-04-02T12:55:00Z
1
value 0.00071
scoring_system epss
scoring_elements 0.21634
published_at 2026-04-13T12:55:00Z
2
value 0.00071
scoring_system epss
scoring_elements 0.21584
published_at 2026-04-07T12:55:00Z
3
value 0.00071
scoring_system epss
scoring_elements 0.21661
published_at 2026-04-08T12:55:00Z
4
value 0.00071
scoring_system epss
scoring_elements 0.21718
published_at 2026-04-09T12:55:00Z
5
value 0.00071
scoring_system epss
scoring_elements 0.2173
published_at 2026-04-11T12:55:00Z
6
value 0.00071
scoring_system epss
scoring_elements 0.21691
published_at 2026-04-12T12:55:00Z
7
value 0.00071
scoring_system epss
scoring_elements 0.21831
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32919
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271437
reference_id 2271437
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271437
10
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T19:33:43Z/
url https://support.apple.com/en-us/HT213530
11
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-21T19:33:43Z/
url https://support.apple.com/en-us/HT213532
12
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
13
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-32919
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mfvu-9zv4-k3gq
149
url VCID-mjg1-q19v-gkcy
vulnerability_id VCID-mjg1-q19v-gkcy
summary webkitgtk: Visiting a malicious website may lead to address bar spoofing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46705.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46705
reference_id
reference_type
scores
0
value 0.00137
scoring_system epss
scoring_elements 0.33674
published_at 2026-04-02T12:55:00Z
1
value 0.00137
scoring_system epss
scoring_elements 0.33707
published_at 2026-04-04T12:55:00Z
2
value 0.00137
scoring_system epss
scoring_elements 0.33545
published_at 2026-04-07T12:55:00Z
3
value 0.00137
scoring_system epss
scoring_elements 0.33589
published_at 2026-04-08T12:55:00Z
4
value 0.00137
scoring_system epss
scoring_elements 0.33623
published_at 2026-04-09T12:55:00Z
5
value 0.00137
scoring_system epss
scoring_elements 0.33618
published_at 2026-04-11T12:55:00Z
6
value 0.00137
scoring_system epss
scoring_elements 0.33577
published_at 2026-04-12T12:55:00Z
7
value 0.00137
scoring_system epss
scoring_elements 0.33554
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46705
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32919
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42826
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46705
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46725
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23517
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-23518
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271444
reference_id 2271444
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271444
10
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
11
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-46705
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mjg1-q19v-gkcy
150
url VCID-mu71-qcsx-33fj
vulnerability_id VCID-mu71-qcsx-33fj
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42950.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42950.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42950
reference_id
reference_type
scores
0
value 0.00645
scoring_system epss
scoring_elements 0.70623
published_at 2026-04-02T12:55:00Z
1
value 0.00645
scoring_system epss
scoring_elements 0.70672
published_at 2026-04-13T12:55:00Z
2
value 0.00645
scoring_system epss
scoring_elements 0.70639
published_at 2026-04-04T12:55:00Z
3
value 0.00645
scoring_system epss
scoring_elements 0.70616
published_at 2026-04-07T12:55:00Z
4
value 0.00645
scoring_system epss
scoring_elements 0.70661
published_at 2026-04-08T12:55:00Z
5
value 0.00645
scoring_system epss
scoring_elements 0.70677
published_at 2026-04-09T12:55:00Z
6
value 0.00645
scoring_system epss
scoring_elements 0.707
published_at 2026-04-11T12:55:00Z
7
value 0.00645
scoring_system epss
scoring_elements 0.70685
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42950
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271718
reference_id 2271718
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271718
14
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
15
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214035
16
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214036
17
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214039
18
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/kb/HT214039
19
reference_url https://support.apple.com/en-us/HT214040
reference_id HT214040
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214040
20
reference_url https://support.apple.com/en-us/HT214041
reference_id HT214041
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://support.apple.com/en-us/HT214041
21
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-03-28T17:46:25Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
22
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
23
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
aliases CVE-2023-42950
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mu71-qcsx-33fj
151
url VCID-mvm2-2uz9-bufg
vulnerability_id VCID-mvm2-2uz9-bufg
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42875.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42875.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42875
reference_id
reference_type
scores
0
value 0.00289
scoring_system epss
scoring_elements 0.52351
published_at 2026-04-13T12:55:00Z
1
value 0.00289
scoring_system epss
scoring_elements 0.52292
published_at 2026-04-02T12:55:00Z
2
value 0.00289
scoring_system epss
scoring_elements 0.52319
published_at 2026-04-04T12:55:00Z
3
value 0.00289
scoring_system epss
scoring_elements 0.52282
published_at 2026-04-07T12:55:00Z
4
value 0.00289
scoring_system epss
scoring_elements 0.52335
published_at 2026-04-08T12:55:00Z
5
value 0.00289
scoring_system epss
scoring_elements 0.5233
published_at 2026-04-09T12:55:00Z
6
value 0.00289
scoring_system epss
scoring_elements 0.5238
published_at 2026-04-11T12:55:00Z
7
value 0.00289
scoring_system epss
scoring_elements 0.52365
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42875
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://support.apple.com/en-us/120330
reference_id 120330
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/
url https://support.apple.com/en-us/120330
14
reference_url https://support.apple.com/en-us/120947
reference_id 120947
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/
url https://support.apple.com/en-us/120947
15
reference_url https://support.apple.com/en-us/120948
reference_id 120948
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/
url https://support.apple.com/en-us/120948
16
reference_url https://support.apple.com/en-us/120949
reference_id 120949
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/
url https://support.apple.com/en-us/120949
17
reference_url https://support.apple.com/en-us/120950
reference_id 120950
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-11T16:22:31Z/
url https://support.apple.com/en-us/120950
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2366497
reference_id 2366497
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2366497
19
reference_url https://security.archlinux.org/ASA-202505-2
reference_id ASA-202505-2
reference_type
scores
url https://security.archlinux.org/ASA-202505-2
20
reference_url https://security.archlinux.org/ASA-202505-3
reference_id ASA-202505-3
reference_type
scores
url https://security.archlinux.org/ASA-202505-3
21
reference_url https://security.archlinux.org/ASA-202505-4
reference_id ASA-202505-4
reference_type
scores
url https://security.archlinux.org/ASA-202505-4
22
reference_url https://security.archlinux.org/ASA-202505-5
reference_id ASA-202505-5
reference_type
scores
url https://security.archlinux.org/ASA-202505-5
23
reference_url https://security.archlinux.org/AVG-2867
reference_id AVG-2867
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2867
24
reference_url https://security.archlinux.org/AVG-2868
reference_id AVG-2868
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2868
25
reference_url https://security.archlinux.org/AVG-2869
reference_id AVG-2869
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2869
26
reference_url https://security.archlinux.org/AVG-2870
reference_id AVG-2870
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2870
27
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
28
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
29
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
30
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
31
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
32
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
33
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
34
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
35
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-42875
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mvm2-2uz9-bufg
152
url VCID-mz2q-gbdt-n3e2
vulnerability_id VCID-mz2q-gbdt-n3e2
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1826.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1826.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1826
reference_id
reference_type
scores
0
value 0.00741
scoring_system epss
scoring_elements 0.72863
published_at 2026-04-01T12:55:00Z
1
value 0.00741
scoring_system epss
scoring_elements 0.72919
published_at 2026-04-13T12:55:00Z
2
value 0.00741
scoring_system epss
scoring_elements 0.72942
published_at 2026-04-11T12:55:00Z
3
value 0.00741
scoring_system epss
scoring_elements 0.72925
published_at 2026-04-12T12:55:00Z
4
value 0.00741
scoring_system epss
scoring_elements 0.72871
published_at 2026-04-02T12:55:00Z
5
value 0.00741
scoring_system epss
scoring_elements 0.72891
published_at 2026-04-04T12:55:00Z
6
value 0.00741
scoring_system epss
scoring_elements 0.72866
published_at 2026-04-07T12:55:00Z
7
value 0.00741
scoring_system epss
scoring_elements 0.72904
published_at 2026-04-08T12:55:00Z
8
value 0.00741
scoring_system epss
scoring_elements 0.72918
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1826
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986860
reference_id 1986860
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986860
14
reference_url https://security.archlinux.org/AVG-2208
reference_id AVG-2208
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2208
15
reference_url https://security.archlinux.org/AVG-2209
reference_id AVG-2209
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2209
16
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
17
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-1826
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-mz2q-gbdt-n3e2
153
url VCID-n28u-18fr-13hs
vulnerability_id VCID-n28u-18fr-13hs
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30762.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30762.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30762
reference_id
reference_type
scores
0
value 0.00049
scoring_system epss
scoring_elements 0.15099
published_at 2026-04-01T12:55:00Z
1
value 0.00049
scoring_system epss
scoring_elements 0.1502
published_at 2026-04-13T12:55:00Z
2
value 0.00049
scoring_system epss
scoring_elements 0.151
published_at 2026-04-08T12:55:00Z
3
value 0.00049
scoring_system epss
scoring_elements 0.1515
published_at 2026-04-09T12:55:00Z
4
value 0.00049
scoring_system epss
scoring_elements 0.15118
published_at 2026-04-11T12:55:00Z
5
value 0.00049
scoring_system epss
scoring_elements 0.1508
published_at 2026-04-12T12:55:00Z
6
value 0.00049
scoring_system epss
scoring_elements 0.15139
published_at 2026-04-02T12:55:00Z
7
value 0.00049
scoring_system epss
scoring_elements 0.15207
published_at 2026-04-04T12:55:00Z
8
value 0.00049
scoring_system epss
scoring_elements 0.15012
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30762
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3885
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3894
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3895
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3897
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3899
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3900
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3901
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3902
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30762
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986898
reference_id 1986898
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986898
12
reference_url https://security.archlinux.org/AVG-2212
reference_id AVG-2212
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2212
13
reference_url https://security.archlinux.org/AVG-2213
reference_id AVG-2213
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2213
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://support.apple.com/en-us/HT212548
reference_id HT212548
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:27:21Z/
url https://support.apple.com/en-us/HT212548
16
reference_url https://access.redhat.com/errata/RHSA-2020:4035
reference_id RHSA-2020:4035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4035
17
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30762
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n28u-18fr-13hs
154
url VCID-n7a4-nphm-ufam
vulnerability_id VCID-n7a4-nphm-ufam
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38611.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38611
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-13T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-11T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-12T12:55:00Z
3
value 0.00663
scoring_system epss
scoring_elements 0.71172
published_at 2026-04-08T12:55:00Z
4
value 0.00663
scoring_system epss
scoring_elements 0.71185
published_at 2026-04-09T12:55:00Z
5
value 0.00663
scoring_system epss
scoring_elements 0.71138
published_at 2026-04-02T12:55:00Z
6
value 0.00663
scoring_system epss
scoring_elements 0.71155
published_at 2026-04-04T12:55:00Z
7
value 0.00663
scoring_system epss
scoring_elements 0.7113
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38611
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231022
reference_id 2231022
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231022
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38611
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7a4-nphm-ufam
155
url VCID-n7w5-dz8n-mbht
vulnerability_id VCID-n7w5-dz8n-mbht
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44244.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44244
reference_id
reference_type
scores
0
value 0.00279
scoring_system epss
scoring_elements 0.51323
published_at 2026-04-13T12:55:00Z
1
value 0.00279
scoring_system epss
scoring_elements 0.51277
published_at 2026-04-02T12:55:00Z
2
value 0.00279
scoring_system epss
scoring_elements 0.51302
published_at 2026-04-04T12:55:00Z
3
value 0.00279
scoring_system epss
scoring_elements 0.51262
published_at 2026-04-07T12:55:00Z
4
value 0.00279
scoring_system epss
scoring_elements 0.51317
published_at 2026-04-08T12:55:00Z
5
value 0.00279
scoring_system epss
scoring_elements 0.51314
published_at 2026-04-09T12:55:00Z
6
value 0.00279
scoring_system epss
scoring_elements 0.51357
published_at 2026-04-11T12:55:00Z
7
value 0.00279
scoring_system epss
scoring_elements 0.51336
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44244
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44244
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121563
reference_id 121563
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121563
5
reference_url https://support.apple.com/en-us/121564
reference_id 121564
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121564
6
reference_url https://support.apple.com/en-us/121565
reference_id 121565
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121565
7
reference_url https://support.apple.com/en-us/121566
reference_id 121566
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121566
8
reference_url https://support.apple.com/en-us/121569
reference_id 121569
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121569
9
reference_url https://support.apple.com/en-us/121571
reference_id 121571
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-10-30T19:39:31Z/
url https://support.apple.com/en-us/121571
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2323278
reference_id 2323278
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2323278
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2024:9545
reference_id RHSA-2024:9545
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9545
13
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
14
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
15
reference_url https://access.redhat.com/errata/RHSA-2024:9637
reference_id RHSA-2024:9637
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9637
16
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
17
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
18
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
19
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
20
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/7113-1/
reference_id USN-7113-1
reference_type
scores
url https://usn.ubuntu.com/7113-1/
fixed_packages
aliases CVE-2024-44244
risk_score 1.9
exploitability 0.5
weighted_severity 3.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-n7w5-dz8n-mbht
156
url VCID-na3e-x43h-7kgr
vulnerability_id VCID-na3e-x43h-7kgr
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30689.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30689.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30689
reference_id
reference_type
scores
0
value 0.01123
scoring_system epss
scoring_elements 0.78204
published_at 2026-04-01T12:55:00Z
1
value 0.01123
scoring_system epss
scoring_elements 0.7826
published_at 2026-04-13T12:55:00Z
2
value 0.01123
scoring_system epss
scoring_elements 0.78282
published_at 2026-04-11T12:55:00Z
3
value 0.01123
scoring_system epss
scoring_elements 0.78265
published_at 2026-04-12T12:55:00Z
4
value 0.01123
scoring_system epss
scoring_elements 0.78213
published_at 2026-04-02T12:55:00Z
5
value 0.01123
scoring_system epss
scoring_elements 0.78243
published_at 2026-04-04T12:55:00Z
6
value 0.01123
scoring_system epss
scoring_elements 0.78225
published_at 2026-04-07T12:55:00Z
7
value 0.01123
scoring_system epss
scoring_elements 0.78251
published_at 2026-04-08T12:55:00Z
8
value 0.01123
scoring_system epss
scoring_elements 0.78257
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30689
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986881
reference_id 1986881
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986881
16
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
17
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
18
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
19
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
20
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
21
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30689
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-na3e-x43h-7kgr
157
url VCID-nhy8-sfpr-eudu
vulnerability_id VCID-nhy8-sfpr-eudu
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35074.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-35074.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-35074
reference_id
reference_type
scores
0
value 0.00598
scoring_system epss
scoring_elements 0.69341
published_at 2026-04-02T12:55:00Z
1
value 0.00598
scoring_system epss
scoring_elements 0.69398
published_at 2026-04-13T12:55:00Z
2
value 0.00598
scoring_system epss
scoring_elements 0.69358
published_at 2026-04-04T12:55:00Z
3
value 0.00598
scoring_system epss
scoring_elements 0.69338
published_at 2026-04-07T12:55:00Z
4
value 0.00598
scoring_system epss
scoring_elements 0.69388
published_at 2026-04-08T12:55:00Z
5
value 0.00598
scoring_system epss
scoring_elements 0.69404
published_at 2026-04-09T12:55:00Z
6
value 0.00598
scoring_system epss
scoring_elements 0.69427
published_at 2026-04-11T12:55:00Z
7
value 0.00598
scoring_system epss
scoring_elements 0.69411
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-35074
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url http://seclists.org/fulldisclosure/2023/Oct/10
reference_id 10
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/10
14
reference_url http://seclists.org/fulldisclosure/2023/Oct/2
reference_id 2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/2
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241403
reference_id 2241403
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241403
16
reference_url http://seclists.org/fulldisclosure/2023/Oct/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/3
17
reference_url http://www.openwall.com/lists/oss-security/2023/09/28/3
reference_id 3
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://www.openwall.com/lists/oss-security/2023/09/28/3
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/
reference_id 4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4EEMDC5TQAANFH5D77QM34ZTUKXPFGVL/
19
reference_url http://seclists.org/fulldisclosure/2023/Oct/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/8
20
reference_url http://seclists.org/fulldisclosure/2023/Oct/9
reference_id 9
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url http://seclists.org/fulldisclosure/2023/Oct/9
21
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://security.gentoo.org/glsa/202401-33
22
reference_url https://support.apple.com/en-us/HT213936
reference_id HT213936
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213936
23
reference_url https://support.apple.com/en-us/HT213937
reference_id HT213937
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213937
24
reference_url https://support.apple.com/en-us/HT213938
reference_id HT213938
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213938
25
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213940
26
reference_url https://support.apple.com/en-us/HT213941
reference_id HT213941
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:54Z/
url https://support.apple.com/en-us/HT213941
27
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
28
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-35074
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nhy8-sfpr-eudu
158
url VCID-nkp9-pvqf-ebcv
vulnerability_id VCID-nkp9-pvqf-ebcv
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30663.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30663.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30663
reference_id
reference_type
scores
0
value 0.00677
scoring_system epss
scoring_elements 0.71506
published_at 2026-04-13T12:55:00Z
1
value 0.00677
scoring_system epss
scoring_elements 0.71465
published_at 2026-04-07T12:55:00Z
2
value 0.00677
scoring_system epss
scoring_elements 0.71505
published_at 2026-04-08T12:55:00Z
3
value 0.00677
scoring_system epss
scoring_elements 0.71517
published_at 2026-04-09T12:55:00Z
4
value 0.00677
scoring_system epss
scoring_elements 0.7154
published_at 2026-04-11T12:55:00Z
5
value 0.00677
scoring_system epss
scoring_elements 0.71525
published_at 2026-04-12T12:55:00Z
6
value 0.01198
scoring_system epss
scoring_elements 0.78883
published_at 2026-04-04T12:55:00Z
7
value 0.01198
scoring_system epss
scoring_elements 0.78854
published_at 2026-04-02T12:55:00Z
8
value 0.01198
scoring_system epss
scoring_elements 0.78848
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30663
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986872
reference_id 1986872
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986872
16
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
17
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
18
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
19
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
20
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
21
reference_url https://support.apple.com/en-us/HT212335
reference_id HT212335
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/
url https://support.apple.com/en-us/HT212335
22
reference_url https://support.apple.com/en-us/HT212336
reference_id HT212336
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/
url https://support.apple.com/en-us/HT212336
23
reference_url https://support.apple.com/en-us/HT212341
reference_id HT212341
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/
url https://support.apple.com/en-us/HT212341
24
reference_url https://support.apple.com/en-us/HT212532
reference_id HT212532
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/
url https://support.apple.com/en-us/HT212532
25
reference_url https://support.apple.com/en-us/HT212534
reference_id HT212534
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-04T16:23:07Z/
url https://support.apple.com/en-us/HT212534
26
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
28
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30663
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nkp9-pvqf-ebcv
159
url VCID-nykh-jh9p-4bhy
vulnerability_id VCID-nykh-jh9p-4bhy
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42863.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42863.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42863
reference_id
reference_type
scores
0
value 0.01018
scoring_system epss
scoring_elements 0.77131
published_at 2026-04-02T12:55:00Z
1
value 0.01018
scoring_system epss
scoring_elements 0.77186
published_at 2026-04-13T12:55:00Z
2
value 0.01018
scoring_system epss
scoring_elements 0.7716
published_at 2026-04-04T12:55:00Z
3
value 0.01018
scoring_system epss
scoring_elements 0.77142
published_at 2026-04-07T12:55:00Z
4
value 0.01018
scoring_system epss
scoring_elements 0.77174
published_at 2026-04-08T12:55:00Z
5
value 0.01018
scoring_system epss
scoring_elements 0.77183
published_at 2026-04-09T12:55:00Z
6
value 0.01018
scoring_system epss
scoring_elements 0.7721
published_at 2026-04-11T12:55:00Z
7
value 0.01018
scoring_system epss
scoring_elements 0.77189
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42863
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url http://www.openwall.com/lists/oss-security/2022/12/26/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://www.openwall.com/lists/oss-security/2022/12/26/1
16
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
17
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156987
reference_id 2156987
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156987
18
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
19
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
20
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
21
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://security.gentoo.org/glsa/202305-32
22
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213530
23
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213532
24
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213535
25
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213536
26
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-21T15:44:16Z/
url https://support.apple.com/en-us/HT213537
27
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
28
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-42863
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-nykh-jh9p-4bhy
160
url VCID-pbn4-npj7-7qhy
vulnerability_id VCID-pbn4-npj7-7qhy
summary webkitgtk: out-of-bounds read was addressed with improved bounds checking
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32912.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32912.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32912
reference_id
reference_type
scores
0
value 0.01557
scoring_system epss
scoring_elements 0.81401
published_at 2026-04-02T12:55:00Z
1
value 0.01557
scoring_system epss
scoring_elements 0.81459
published_at 2026-04-13T12:55:00Z
2
value 0.01557
scoring_system epss
scoring_elements 0.81424
published_at 2026-04-04T12:55:00Z
3
value 0.01557
scoring_system epss
scoring_elements 0.81423
published_at 2026-04-07T12:55:00Z
4
value 0.01557
scoring_system epss
scoring_elements 0.81451
published_at 2026-04-08T12:55:00Z
5
value 0.01557
scoring_system epss
scoring_elements 0.81456
published_at 2026-04-09T12:55:00Z
6
value 0.01557
scoring_system epss
scoring_elements 0.81478
published_at 2026-04-11T12:55:00Z
7
value 0.01557
scoring_system epss
scoring_elements 0.81466
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32912
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2128645
reference_id 2128645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2128645
4
reference_url http://seclists.org/fulldisclosure/2022/Oct/28
reference_id 28
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/
url http://seclists.org/fulldisclosure/2022/Oct/28
5
reference_url http://seclists.org/fulldisclosure/2022/Oct/39
reference_id 39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/
url http://seclists.org/fulldisclosure/2022/Oct/39
6
reference_url http://seclists.org/fulldisclosure/2022/Oct/40
reference_id 40
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/
url http://seclists.org/fulldisclosure/2022/Oct/40
7
reference_url http://seclists.org/fulldisclosure/2022/Oct/41
reference_id 41
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/
url http://seclists.org/fulldisclosure/2022/Oct/41
8
reference_url http://seclists.org/fulldisclosure/2022/Oct/47
reference_id 47
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/
url http://seclists.org/fulldisclosure/2022/Oct/47
9
reference_url http://seclists.org/fulldisclosure/2022/Oct/49
reference_id 49
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/
url http://seclists.org/fulldisclosure/2022/Oct/49
10
reference_url http://seclists.org/fulldisclosure/2022/Oct/50
reference_id 50
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/
url http://seclists.org/fulldisclosure/2022/Oct/50
11
reference_url https://support.apple.com/en-us/HT213442
reference_id HT213442
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/
url https://support.apple.com/en-us/HT213442
12
reference_url https://support.apple.com/en-us/HT213445
reference_id HT213445
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/
url https://support.apple.com/en-us/HT213445
13
reference_url https://support.apple.com/en-us/HT213446
reference_id HT213446
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-29T14:17:11Z/
url https://support.apple.com/en-us/HT213446
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-32912
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pbn4-npj7-7qhy
161
url VCID-pg5b-3vcj-7bav
vulnerability_id VCID-pg5b-3vcj-7bav
summary webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27851.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27851
reference_id
reference_type
scores
0
value 0.00982
scoring_system epss
scoring_elements 0.76783
published_at 2026-04-13T12:55:00Z
1
value 0.00982
scoring_system epss
scoring_elements 0.76758
published_at 2026-04-04T12:55:00Z
2
value 0.00982
scoring_system epss
scoring_elements 0.7674
published_at 2026-04-07T12:55:00Z
3
value 0.00982
scoring_system epss
scoring_elements 0.76771
published_at 2026-04-08T12:55:00Z
4
value 0.00982
scoring_system epss
scoring_elements 0.76782
published_at 2026-04-09T12:55:00Z
5
value 0.00982
scoring_system epss
scoring_elements 0.7681
published_at 2026-04-11T12:55:00Z
6
value 0.00982
scoring_system epss
scoring_elements 0.7679
published_at 2026-04-12T12:55:00Z
7
value 0.01303
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27851
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27851
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120896
5
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120901
6
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120902
7
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120903
8
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120905
9
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/120906
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314704
reference_id 2314704
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314704
11
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
12
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214101
13
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214102
14
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214103
15
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214104
16
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214106
17
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T14:03:47Z/
url https://support.apple.com/en-us/HT214108
18
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
19
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
22
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
23
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
24
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
25
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-27851
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pg5b-3vcj-7bav
162
url VCID-pyek-9fpp-nudy
vulnerability_id VCID-pyek-9fpp-nudy
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40866.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40866
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25506
published_at 2026-04-13T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.25472
published_at 2026-04-07T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25546
published_at 2026-04-08T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25594
published_at 2026-04-09T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25604
published_at 2026-04-11T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25563
published_at 2026-04-12T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.25663
published_at 2026-04-02T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25704
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40866
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40866
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121238
reference_id 121238
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/
url https://support.apple.com/en-us/121238
5
reference_url https://support.apple.com/en-us/121241
reference_id 121241
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-09-18T17:55:34Z/
url https://support.apple.com/en-us/121241
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2312724
reference_id 2312724
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2312724
7
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
8
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
9
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
10
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://usn.ubuntu.com/7079-1/
reference_id USN-7079-1
reference_type
scores
url https://usn.ubuntu.com/7079-1/
fixed_packages
aliases CVE-2024-40866
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-pyek-9fpp-nudy
163
url VCID-q1rs-zvcq-9kbd
vulnerability_id VCID-q1rs-zvcq-9kbd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37450.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-37450.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-37450
reference_id
reference_type
scores
0
value 0.00054
scoring_system epss
scoring_elements 0.17077
published_at 2026-04-02T12:55:00Z
1
value 0.00054
scoring_system epss
scoring_elements 0.16925
published_at 2026-04-13T12:55:00Z
2
value 0.00054
scoring_system epss
scoring_elements 0.17131
published_at 2026-04-04T12:55:00Z
3
value 0.00054
scoring_system epss
scoring_elements 0.16908
published_at 2026-04-07T12:55:00Z
4
value 0.00054
scoring_system epss
scoring_elements 0.16997
published_at 2026-04-08T12:55:00Z
5
value 0.00054
scoring_system epss
scoring_elements 0.17055
published_at 2026-04-09T12:55:00Z
6
value 0.00054
scoring_system epss
scoring_elements 0.17031
published_at 2026-04-11T12:55:00Z
7
value 0.00054
scoring_system epss
scoring_elements 0.16985
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-37450
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-37450
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2223000
reference_id 2223000
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2223000
5
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://security.gentoo.org/glsa/202401-04
6
reference_url https://support.apple.com/en-us/HT213826
reference_id HT213826
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213826
7
reference_url https://support.apple.com/en-us/HT213841
reference_id HT213841
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213841
8
reference_url https://support.apple.com/en-us/HT213843
reference_id HT213843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213843
9
reference_url https://support.apple.com/en-us/HT213846
reference_id HT213846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213846
10
reference_url https://support.apple.com/en-us/HT213848
reference_id HT213848
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-05T14:56:27Z/
url https://support.apple.com/en-us/HT213848
11
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
12
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
aliases CVE-2023-37450
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q1rs-zvcq-9kbd
164
url VCID-q3jv-e392-5fef
vulnerability_id VCID-q3jv-e392-5fef
summary webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40780.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40780
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25195
published_at 2026-04-13T12:55:00Z
1
value 0.00096
scoring_system epss
scoring_elements 0.26649
published_at 2026-04-11T12:55:00Z
2
value 0.00096
scoring_system epss
scoring_elements 0.26644
published_at 2026-04-09T12:55:00Z
3
value 0.00096
scoring_system epss
scoring_elements 0.26594
published_at 2026-04-08T12:55:00Z
4
value 0.00096
scoring_system epss
scoring_elements 0.26741
published_at 2026-04-04T12:55:00Z
5
value 0.00096
scoring_system epss
scoring_elements 0.26526
published_at 2026-04-07T12:55:00Z
6
value 0.00096
scoring_system epss
scoring_elements 0.26604
published_at 2026-04-12T12:55:00Z
7
value 0.00096
scoring_system epss
scoring_elements 0.26699
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40780
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40780
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2302069
reference_id 2302069
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2302069
19
reference_url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
reference_id apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
20
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214116
21
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214117
22
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214119
23
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214121
24
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214122
25
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214123
26
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-29T23:51:19Z/
url https://support.apple.com/en-us/HT214124
27
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
31
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
32
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
33
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
34
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
35
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
36
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
aliases CVE-2024-40780
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q3jv-e392-5fef
165
url VCID-q834-6aag-f3dx
vulnerability_id VCID-q834-6aag-f3dx
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1788.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1788.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1788
reference_id
reference_type
scores
0
value 0.00408
scoring_system epss
scoring_elements 0.61031
published_at 2026-04-01T12:55:00Z
1
value 0.00408
scoring_system epss
scoring_elements 0.61154
published_at 2026-04-13T12:55:00Z
2
value 0.00408
scoring_system epss
scoring_elements 0.61166
published_at 2026-04-09T12:55:00Z
3
value 0.00408
scoring_system epss
scoring_elements 0.61186
published_at 2026-04-11T12:55:00Z
4
value 0.00408
scoring_system epss
scoring_elements 0.61173
published_at 2026-04-12T12:55:00Z
5
value 0.00408
scoring_system epss
scoring_elements 0.61108
published_at 2026-04-02T12:55:00Z
6
value 0.00408
scoring_system epss
scoring_elements 0.61136
published_at 2026-04-04T12:55:00Z
7
value 0.00408
scoring_system epss
scoring_elements 0.61103
published_at 2026-04-07T12:55:00Z
8
value 0.00408
scoring_system epss
scoring_elements 0.61151
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1788
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944859
reference_id 1944859
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944859
8
reference_url https://security.archlinux.org/AVG-1744
reference_id AVG-1744
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1744
9
reference_url https://security.archlinux.org/AVG-1745
reference_id AVG-1745
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1745
10
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
11
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://usn.ubuntu.com/4939-1/
reference_id USN-4939-1
reference_type
scores
url https://usn.ubuntu.com/4939-1/
fixed_packages
aliases CVE-2021-1788
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q834-6aag-f3dx
166
url VCID-q8gz-5f27-eqhu
vulnerability_id VCID-q8gz-5f27-eqhu
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1789.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1789.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1789
reference_id
reference_type
scores
0
value 0.00243
scoring_system epss
scoring_elements 0.47558
published_at 2026-04-01T12:55:00Z
1
value 0.00243
scoring_system epss
scoring_elements 0.47626
published_at 2026-04-13T12:55:00Z
2
value 0.00243
scoring_system epss
scoring_elements 0.47597
published_at 2026-04-02T12:55:00Z
3
value 0.00243
scoring_system epss
scoring_elements 0.47618
published_at 2026-04-04T12:55:00Z
4
value 0.00243
scoring_system epss
scoring_elements 0.47567
published_at 2026-04-07T12:55:00Z
5
value 0.00243
scoring_system epss
scoring_elements 0.47622
published_at 2026-04-08T12:55:00Z
6
value 0.00243
scoring_system epss
scoring_elements 0.47617
published_at 2026-04-12T12:55:00Z
7
value 0.00243
scoring_system epss
scoring_elements 0.47641
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1789
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-27918
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-29623
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1765
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1789
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1799
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1801
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1870
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21806
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944337
reference_id 1944337
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944337
12
reference_url https://security.archlinux.org/ASA-202103-24
reference_id ASA-202103-24
reference_type
scores
url https://security.archlinux.org/ASA-202103-24
13
reference_url https://security.archlinux.org/ASA-202103-25
reference_id ASA-202103-25
reference_type
scores
url https://security.archlinux.org/ASA-202103-25
14
reference_url https://security.archlinux.org/AVG-1721
reference_id AVG-1721
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1721
15
reference_url https://security.archlinux.org/AVG-1722
reference_id AVG-1722
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1722
16
reference_url https://security.gentoo.org/glsa/202104-03
reference_id GLSA-202104-03
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/
url https://security.gentoo.org/glsa/202104-03
17
reference_url https://support.apple.com/en-us/HT212146
reference_id HT212146
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/
url https://support.apple.com/en-us/HT212146
18
reference_url https://support.apple.com/en-us/HT212147
reference_id HT212147
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/
url https://support.apple.com/en-us/HT212147
19
reference_url https://support.apple.com/en-us/HT212148
reference_id HT212148
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/
url https://support.apple.com/en-us/HT212148
20
reference_url https://support.apple.com/en-us/HT212149
reference_id HT212149
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/
url https://support.apple.com/en-us/HT212149
21
reference_url https://support.apple.com/en-us/HT212152
reference_id HT212152
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/
url https://support.apple.com/en-us/HT212152
22
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/
reference_id JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JN6ZOD62CTO54CHTMJTHVEF6R2Y532TJ/
23
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/
reference_id L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:34:43Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/
24
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/4894-1/
reference_id USN-4894-1
reference_type
scores
url https://usn.ubuntu.com/4894-1/
fixed_packages
aliases CVE-2021-1789
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8gz-5f27-eqhu
167
url VCID-q8ps-wucu-73ht
vulnerability_id VCID-q8ps-wucu-73ht
summary webkitgtk: malicious content may lead to UI spoofing
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32816.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32816.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32816
reference_id
reference_type
scores
0
value 0.0009
scoring_system epss
scoring_elements 0.25512
published_at 2026-04-13T12:55:00Z
1
value 0.0009
scoring_system epss
scoring_elements 0.2567
published_at 2026-04-02T12:55:00Z
2
value 0.0009
scoring_system epss
scoring_elements 0.25711
published_at 2026-04-04T12:55:00Z
3
value 0.0009
scoring_system epss
scoring_elements 0.25478
published_at 2026-04-07T12:55:00Z
4
value 0.0009
scoring_system epss
scoring_elements 0.25551
published_at 2026-04-08T12:55:00Z
5
value 0.0009
scoring_system epss
scoring_elements 0.25599
published_at 2026-04-09T12:55:00Z
6
value 0.0009
scoring_system epss
scoring_elements 0.2561
published_at 2026-04-11T12:55:00Z
7
value 0.0009
scoring_system epss
scoring_elements 0.25568
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32816
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238975
reference_id 2238975
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238975
7
reference_url https://security.archlinux.org/AVG-2789
reference_id AVG-2789
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2789
8
reference_url https://security.archlinux.org/AVG-2790
reference_id AVG-2790
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2790
9
reference_url https://security.archlinux.org/AVG-2791
reference_id AVG-2791
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2791
10
reference_url https://support.apple.com/en-us/HT213340
reference_id HT213340
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T19:37:09Z/
url https://support.apple.com/en-us/HT213340
11
reference_url https://support.apple.com/en-us/HT213342
reference_id HT213342
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T19:37:09Z/
url https://support.apple.com/en-us/HT213342
12
reference_url https://support.apple.com/en-us/HT213346
reference_id HT213346
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-05-22T19:37:09Z/
url https://support.apple.com/en-us/HT213346
13
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
14
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5568-1/
reference_id USN-5568-1
reference_type
scores
url https://usn.ubuntu.com/5568-1/
fixed_packages
aliases CVE-2022-32816
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-q8ps-wucu-73ht
168
url VCID-qf9z-ascr-cuf6
vulnerability_id VCID-qf9z-ascr-cuf6
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30954.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30954
reference_id
reference_type
scores
0
value 0.00321
scoring_system epss
scoring_elements 0.55039
published_at 2026-04-01T12:55:00Z
1
value 0.00321
scoring_system epss
scoring_elements 0.5514
published_at 2026-04-02T12:55:00Z
2
value 0.00321
scoring_system epss
scoring_elements 0.55164
published_at 2026-04-04T12:55:00Z
3
value 0.00321
scoring_system epss
scoring_elements 0.55139
published_at 2026-04-07T12:55:00Z
4
value 0.00321
scoring_system epss
scoring_elements 0.55188
published_at 2026-04-09T12:55:00Z
5
value 0.00321
scoring_system epss
scoring_elements 0.55199
published_at 2026-04-11T12:55:00Z
6
value 0.00321
scoring_system epss
scoring_elements 0.5518
published_at 2026-04-12T12:55:00Z
7
value 0.00321
scoring_system epss
scoring_elements 0.55162
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044551
reference_id 2044551
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044551
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30954
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qf9z-ascr-cuf6
169
url VCID-qtt7-5r89-tbg7
vulnerability_id VCID-qtt7-5r89-tbg7
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26709.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26709.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26709
reference_id
reference_type
scores
0
value 0.00159
scoring_system epss
scoring_elements 0.3685
published_at 2026-04-04T12:55:00Z
1
value 0.00159
scoring_system epss
scoring_elements 0.36753
published_at 2026-04-09T12:55:00Z
2
value 0.00159
scoring_system epss
scoring_elements 0.36736
published_at 2026-04-08T12:55:00Z
3
value 0.00159
scoring_system epss
scoring_elements 0.36818
published_at 2026-04-02T12:55:00Z
4
value 0.00159
scoring_system epss
scoring_elements 0.36686
published_at 2026-04-07T12:55:00Z
5
value 0.00201
scoring_system epss
scoring_elements 0.42158
published_at 2026-04-13T12:55:00Z
6
value 0.00201
scoring_system epss
scoring_elements 0.42221
published_at 2026-04-11T12:55:00Z
7
value 0.00201
scoring_system epss
scoring_elements 0.42184
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26709
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092733
reference_id 2092733
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092733
10
reference_url https://security.archlinux.org/AVG-2758
reference_id AVG-2758
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2758
11
reference_url https://security.archlinux.org/AVG-2759
reference_id AVG-2759
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2759
12
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
13
reference_url https://support.apple.com/en-us/HT213253
reference_id HT213253
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/
url https://support.apple.com/en-us/HT213253
14
reference_url https://support.apple.com/en-us/HT213254
reference_id HT213254
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/
url https://support.apple.com/en-us/HT213254
15
reference_url https://support.apple.com/en-us/HT213257
reference_id HT213257
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/
url https://support.apple.com/en-us/HT213257
16
reference_url https://support.apple.com/en-us/HT213258
reference_id HT213258
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/
url https://support.apple.com/en-us/HT213258
17
reference_url https://support.apple.com/en-us/HT213260
reference_id HT213260
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T19:07:29Z/
url https://support.apple.com/en-us/HT213260
18
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
19
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/5457-1/
reference_id USN-5457-1
reference_type
scores
url https://usn.ubuntu.com/5457-1/
fixed_packages
aliases CVE-2022-26709
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qtt7-5r89-tbg7
170
url VCID-qvy2-8161-eycu
vulnerability_id VCID-qvy2-8161-eycu
summary webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40782.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40782
reference_id
reference_type
scores
0
value 0.00389
scoring_system epss
scoring_elements 0.6002
published_at 2026-04-13T12:55:00Z
1
value 0.00423
scoring_system epss
scoring_elements 0.62134
published_at 2026-04-12T12:55:00Z
2
value 0.00423
scoring_system epss
scoring_elements 0.62144
published_at 2026-04-11T12:55:00Z
3
value 0.00423
scoring_system epss
scoring_elements 0.62125
published_at 2026-04-09T12:55:00Z
4
value 0.00423
scoring_system epss
scoring_elements 0.62107
published_at 2026-04-08T12:55:00Z
5
value 0.00423
scoring_system epss
scoring_elements 0.62057
published_at 2026-04-07T12:55:00Z
6
value 0.00423
scoring_system epss
scoring_elements 0.62088
published_at 2026-04-04T12:55:00Z
7
value 0.00445
scoring_system epss
scoring_elements 0.63402
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40782
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40782
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2302071
reference_id 2302071
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2302071
19
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214116
20
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214117
21
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214119
22
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214121
23
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214122
24
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214123
25
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2024-07-30T14:29:08Z/
url https://support.apple.com/en-us/HT214124
26
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
27
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
28
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
29
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
30
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
31
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
32
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
33
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
aliases CVE-2024-40782
risk_score 3.9
exploitability 0.5
weighted_severity 7.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qvy2-8161-eycu
171
url VCID-qzm6-yqm1-abdh
vulnerability_id VCID-qzm6-yqm1-abdh
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9806.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9806.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9806
reference_id
reference_type
scores
0
value 0.00674
scoring_system epss
scoring_elements 0.71365
published_at 2026-04-07T12:55:00Z
1
value 0.00674
scoring_system epss
scoring_elements 0.71408
published_at 2026-04-13T12:55:00Z
2
value 0.00674
scoring_system epss
scoring_elements 0.71441
published_at 2026-04-11T12:55:00Z
3
value 0.00674
scoring_system epss
scoring_elements 0.71426
published_at 2026-04-12T12:55:00Z
4
value 0.00674
scoring_system epss
scoring_elements 0.71373
published_at 2026-04-02T12:55:00Z
5
value 0.00674
scoring_system epss
scoring_elements 0.71391
published_at 2026-04-04T12:55:00Z
6
value 0.00674
scoring_system epss
scoring_elements 0.71406
published_at 2026-04-08T12:55:00Z
7
value 0.00674
scoring_system epss
scoring_elements 0.71419
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9806
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879563
reference_id 1879563
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879563
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
aliases CVE-2020-9806
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-qzm6-yqm1-abdh
172
url VCID-r24t-dva3-kub8
vulnerability_id VCID-r24t-dva3-kub8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22590.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22590.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22590
reference_id
reference_type
scores
0
value 0.00401
scoring_system epss
scoring_elements 0.60724
published_at 2026-04-02T12:55:00Z
1
value 0.00401
scoring_system epss
scoring_elements 0.60754
published_at 2026-04-04T12:55:00Z
2
value 0.00401
scoring_system epss
scoring_elements 0.60719
published_at 2026-04-07T12:55:00Z
3
value 0.00401
scoring_system epss
scoring_elements 0.60768
published_at 2026-04-08T12:55:00Z
4
value 0.00401
scoring_system epss
scoring_elements 0.60783
published_at 2026-04-09T12:55:00Z
5
value 0.00401
scoring_system epss
scoring_elements 0.60805
published_at 2026-04-11T12:55:00Z
6
value 0.00401
scoring_system epss
scoring_elements 0.60791
published_at 2026-04-12T12:55:00Z
7
value 0.00401
scoring_system epss
scoring_elements 0.60772
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22590
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053181
reference_id 2053181
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053181
8
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
9
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
10
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
11
reference_url https://usn.ubuntu.com/5306-1/
reference_id USN-5306-1
reference_type
scores
url https://usn.ubuntu.com/5306-1/
fixed_packages
aliases CVE-2022-22590
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r24t-dva3-kub8
173
url VCID-r25x-h5yu-quc1
vulnerability_id VCID-r25x-h5yu-quc1
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42890.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42890.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42890
reference_id
reference_type
scores
0
value 0.00402
scoring_system epss
scoring_elements 0.60742
published_at 2026-04-02T12:55:00Z
1
value 0.00402
scoring_system epss
scoring_elements 0.60789
published_at 2026-04-13T12:55:00Z
2
value 0.00402
scoring_system epss
scoring_elements 0.60771
published_at 2026-04-04T12:55:00Z
3
value 0.00402
scoring_system epss
scoring_elements 0.60735
published_at 2026-04-07T12:55:00Z
4
value 0.00402
scoring_system epss
scoring_elements 0.60784
published_at 2026-04-08T12:55:00Z
5
value 0.00402
scoring_system epss
scoring_elements 0.60799
published_at 2026-04-09T12:55:00Z
6
value 0.00402
scoring_system epss
scoring_elements 0.6082
published_at 2026-04-11T12:55:00Z
7
value 0.00402
scoring_system epss
scoring_elements 0.60807
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42890
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url http://www.openwall.com/lists/oss-security/2023/12/18/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://www.openwall.com/lists/oss-security/2023/12/18/1
14
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
15
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254327
reference_id 2254327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254327
17
reference_url http://seclists.org/fulldisclosure/2023/Dec/6
reference_id 6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/6
18
reference_url http://seclists.org/fulldisclosure/2023/Dec/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/7
19
reference_url http://seclists.org/fulldisclosure/2023/Dec/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url http://seclists.org/fulldisclosure/2023/Dec/9
20
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://security.gentoo.org/glsa/202401-33
21
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214035
22
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214036
23
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214039
24
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/kb/HT214039
25
reference_url https://support.apple.com/en-us/HT214040
reference_id HT214040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214040
26
reference_url https://support.apple.com/en-us/HT214041
reference_id HT214041
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-08-28T14:54:09Z/
url https://support.apple.com/en-us/HT214041
27
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
28
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-42890
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r25x-h5yu-quc1
174
url VCID-r27p-urrj-ckac
vulnerability_id VCID-r27p-urrj-ckac
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13753.json
reference_id
reference_type
scores
0
value 10.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13753.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13753
reference_id
reference_type
scores
0
value 0.01219
scoring_system epss
scoring_elements 0.7901
published_at 2026-04-01T12:55:00Z
1
value 0.01219
scoring_system epss
scoring_elements 0.79057
published_at 2026-04-13T12:55:00Z
2
value 0.01219
scoring_system epss
scoring_elements 0.79082
published_at 2026-04-11T12:55:00Z
3
value 0.01219
scoring_system epss
scoring_elements 0.79067
published_at 2026-04-12T12:55:00Z
4
value 0.01219
scoring_system epss
scoring_elements 0.79016
published_at 2026-04-02T12:55:00Z
5
value 0.01219
scoring_system epss
scoring_elements 0.79042
published_at 2026-04-04T12:55:00Z
6
value 0.01219
scoring_system epss
scoring_elements 0.79027
published_at 2026-04-07T12:55:00Z
7
value 0.01219
scoring_system epss
scoring_elements 0.79051
published_at 2026-04-08T12:55:00Z
8
value 0.01219
scoring_system epss
scoring_elements 0.79058
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13753
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879570
reference_id 1879570
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879570
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
17
reference_url https://usn.ubuntu.com/4648-1/
reference_id USN-4648-1
reference_type
scores
url https://usn.ubuntu.com/4648-1/
fixed_packages
aliases CVE-2020-13753
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r27p-urrj-ckac
175
url VCID-r8td-qqvp-xbbd
vulnerability_id VCID-r8td-qqvp-xbbd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38572.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38572
reference_id
reference_type
scores
0
value 0.00414
scoring_system epss
scoring_elements 0.61626
published_at 2026-04-13T12:55:00Z
1
value 0.00414
scoring_system epss
scoring_elements 0.61657
published_at 2026-04-11T12:55:00Z
2
value 0.00414
scoring_system epss
scoring_elements 0.61646
published_at 2026-04-12T12:55:00Z
3
value 0.00532
scoring_system epss
scoring_elements 0.673
published_at 2026-04-08T12:55:00Z
4
value 0.00532
scoring_system epss
scoring_elements 0.67313
published_at 2026-04-09T12:55:00Z
5
value 0.00532
scoring_system epss
scoring_elements 0.67246
published_at 2026-04-02T12:55:00Z
6
value 0.00532
scoring_system epss
scoring_elements 0.67271
published_at 2026-04-04T12:55:00Z
7
value 0.00532
scoring_system epss
scoring_elements 0.67248
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38572
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231028
reference_id 2231028
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231028
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
17
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38572
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-r8td-qqvp-xbbd
176
url VCID-rhrs-vpu4-4qeb
vulnerability_id VCID-rhrs-vpu4-4qeb
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30761.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30761.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30761
reference_id
reference_type
scores
0
value 0.00317
scoring_system epss
scoring_elements 0.54722
published_at 2026-04-01T12:55:00Z
1
value 0.00317
scoring_system epss
scoring_elements 0.54814
published_at 2026-04-04T12:55:00Z
2
value 0.00317
scoring_system epss
scoring_elements 0.54783
published_at 2026-04-07T12:55:00Z
3
value 0.00317
scoring_system epss
scoring_elements 0.54834
published_at 2026-04-08T12:55:00Z
4
value 0.00317
scoring_system epss
scoring_elements 0.54831
published_at 2026-04-09T12:55:00Z
5
value 0.00317
scoring_system epss
scoring_elements 0.54842
published_at 2026-04-11T12:55:00Z
6
value 0.00317
scoring_system epss
scoring_elements 0.54824
published_at 2026-04-12T12:55:00Z
7
value 0.00317
scoring_system epss
scoring_elements 0.54791
published_at 2026-04-02T12:55:00Z
8
value 0.00511
scoring_system epss
scoring_elements 0.66427
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30761
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986894
reference_id 1986894
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986894
23
reference_url https://security.archlinux.org/AVG-2210
reference_id AVG-2210
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2210
24
reference_url https://security.archlinux.org/AVG-2211
reference_id AVG-2211
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2211
25
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
26
reference_url https://support.apple.com/en-us/HT212548
reference_id HT212548
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:27:48Z/
url https://support.apple.com/en-us/HT212548
27
reference_url https://access.redhat.com/errata/RHSA-2020:4035
reference_id RHSA-2020:4035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4035
28
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30761
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rhrs-vpu4-4qeb
177
url VCID-rj9q-8rw3-qbbn
vulnerability_id VCID-rj9q-8rw3-qbbn
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24264.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24264
reference_id
reference_type
scores
0
value 0.01384
scoring_system epss
scoring_elements 0.80265
published_at 2026-04-02T12:55:00Z
1
value 0.01384
scoring_system epss
scoring_elements 0.8031
published_at 2026-04-13T12:55:00Z
2
value 0.01384
scoring_system epss
scoring_elements 0.80286
published_at 2026-04-04T12:55:00Z
3
value 0.01384
scoring_system epss
scoring_elements 0.80274
published_at 2026-04-07T12:55:00Z
4
value 0.01384
scoring_system epss
scoring_elements 0.80302
published_at 2026-04-08T12:55:00Z
5
value 0.01384
scoring_system epss
scoring_elements 0.80313
published_at 2026-04-09T12:55:00Z
6
value 0.01384
scoring_system epss
scoring_elements 0.80331
published_at 2026-04-11T12:55:00Z
7
value 0.01384
scoring_system epss
scoring_elements 0.80316
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24264
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24264
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122377
8
reference_url https://support.apple.com/en-us/122378
reference_id 122378
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122378
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-04-01T13:17:25Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357918
reference_id 2357918
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357918
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
13
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
14
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
15
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
16
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
17
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
aliases CVE-2025-24264
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rj9q-8rw3-qbbn
178
url VCID-rquw-cmsc-tka8
vulnerability_id VCID-rquw-cmsc-tka8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32893.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32893.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32893
reference_id
reference_type
scores
0
value 0.00163
scoring_system epss
scoring_elements 0.37182
published_at 2026-04-13T12:55:00Z
1
value 0.00163
scoring_system epss
scoring_elements 0.37208
published_at 2026-04-12T12:55:00Z
2
value 0.00163
scoring_system epss
scoring_elements 0.37242
published_at 2026-04-11T12:55:00Z
3
value 0.00163
scoring_system epss
scoring_elements 0.37313
published_at 2026-04-02T12:55:00Z
4
value 0.00163
scoring_system epss
scoring_elements 0.37232
published_at 2026-04-09T12:55:00Z
5
value 0.00163
scoring_system epss
scoring_elements 0.37217
published_at 2026-04-08T12:55:00Z
6
value 0.00163
scoring_system epss
scoring_elements 0.37338
published_at 2026-04-04T12:55:00Z
7
value 0.00163
scoring_system epss
scoring_elements 0.37166
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32893
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32893
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2022/08/29/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url http://www.openwall.com/lists/oss-security/2022/08/29/1
5
reference_url http://www.openwall.com/lists/oss-security/2022/09/13/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url http://www.openwall.com/lists/oss-security/2022/09/13/1
6
reference_url http://www.openwall.com/lists/oss-security/2022/09/02/10
reference_id 10
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url http://www.openwall.com/lists/oss-security/2022/09/02/10
7
reference_url http://seclists.org/fulldisclosure/2022/Aug/16
reference_id 16
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url http://seclists.org/fulldisclosure/2022/Aug/16
8
reference_url http://www.openwall.com/lists/oss-security/2022/08/26/2
reference_id 2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url http://www.openwall.com/lists/oss-security/2022/08/26/2
9
reference_url http://www.openwall.com/lists/oss-security/2022/08/29/2
reference_id 2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url http://www.openwall.com/lists/oss-security/2022/08/29/2
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2121645
reference_id 2121645
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2121645
11
reference_url http://seclists.org/fulldisclosure/2022/Oct/49
reference_id 49
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url http://seclists.org/fulldisclosure/2022/Oct/49
12
reference_url http://www.openwall.com/lists/oss-security/2022/08/25/5
reference_id 5
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url http://www.openwall.com/lists/oss-security/2022/08/25/5
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
reference_id 7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7SETAAXEPGNBMYKTUDFEZHS5LGSQ64QL/
14
reference_url https://security.archlinux.org/AVG-2819
reference_id AVG-2819
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2819
15
reference_url https://security.archlinux.org/AVG-2820
reference_id AVG-2820
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2820
16
reference_url https://www.debian.org/security/2022/dsa-5219
reference_id dsa-5219
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url https://www.debian.org/security/2022/dsa-5219
17
reference_url https://www.debian.org/security/2022/dsa-5220
reference_id dsa-5220
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url https://www.debian.org/security/2022/dsa-5220
18
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url https://security.gentoo.org/glsa/202208-39
19
reference_url https://support.apple.com/en-us/HT213412
reference_id HT213412
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url https://support.apple.com/en-us/HT213412
20
reference_url https://support.apple.com/en-us/HT213413
reference_id HT213413
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url https://support.apple.com/en-us/HT213413
21
reference_url https://support.apple.com/en-us/HT213414
reference_id HT213414
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url https://support.apple.com/en-us/HT213414
22
reference_url https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
reference_id msg00019.html
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url https://lists.debian.org/debian-lts-announce/2022/08/msg00019.html
23
reference_url https://access.redhat.com/errata/RHSA-2022:6540
reference_id RHSA-2022:6540
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6540
24
reference_url https://access.redhat.com/errata/RHSA-2022:6634
reference_id RHSA-2022:6634
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:6634
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/5611-1/
reference_id USN-5611-1
reference_type
scores
url https://usn.ubuntu.com/5611-1/
27
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
reference_id YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T16:26:40Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YKJGV2EXVMYQW3OAJNI4WUTKKVMD2YYK/
fixed_packages
aliases CVE-2022-32893
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rquw-cmsc-tka8
179
url VCID-rspt-fzz1-vudp
vulnerability_id VCID-rspt-fzz1-vudp
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42833.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42833
reference_id
reference_type
scores
0
value 0.00606
scoring_system epss
scoring_elements 0.69649
published_at 2026-04-13T12:55:00Z
1
value 0.00606
scoring_system epss
scoring_elements 0.69595
published_at 2026-04-02T12:55:00Z
2
value 0.00606
scoring_system epss
scoring_elements 0.69611
published_at 2026-04-04T12:55:00Z
3
value 0.00606
scoring_system epss
scoring_elements 0.69589
published_at 2026-04-07T12:55:00Z
4
value 0.00606
scoring_system epss
scoring_elements 0.6964
published_at 2026-04-08T12:55:00Z
5
value 0.00606
scoring_system epss
scoring_elements 0.69657
published_at 2026-04-09T12:55:00Z
6
value 0.00606
scoring_system epss
scoring_elements 0.69679
published_at 2026-04-11T12:55:00Z
7
value 0.00606
scoring_system epss
scoring_elements 0.69664
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42833
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270146
reference_id 2270146
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270146
16
reference_url http://www.openwall.com/lists/oss-security/2024/02/05/8
reference_id 8
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/
url http://www.openwall.com/lists/oss-security/2024/02/05/8
17
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
18
reference_url https://support.apple.com/en-us/HT213938
reference_id HT213938
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/
url https://support.apple.com/en-us/HT213938
19
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/
url https://support.apple.com/en-us/HT213940
20
reference_url https://support.apple.com/en-us/HT213941
reference_id HT213941
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-11-06T19:20:09Z/
url https://support.apple.com/en-us/HT213941
21
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
22
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-42833
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rspt-fzz1-vudp
180
url VCID-ryxv-e8de-q7h8
vulnerability_id VCID-ryxv-e8de-q7h8
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42799.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-42799.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-42799
reference_id
reference_type
scores
0
value 0.00462
scoring_system epss
scoring_elements 0.64205
published_at 2026-04-02T12:55:00Z
1
value 0.00462
scoring_system epss
scoring_elements 0.64233
published_at 2026-04-04T12:55:00Z
2
value 0.00462
scoring_system epss
scoring_elements 0.64194
published_at 2026-04-07T12:55:00Z
3
value 0.00462
scoring_system epss
scoring_elements 0.64244
published_at 2026-04-08T12:55:00Z
4
value 0.00462
scoring_system epss
scoring_elements 0.6426
published_at 2026-04-09T12:55:00Z
5
value 0.00523
scoring_system epss
scoring_elements 0.6692
published_at 2026-04-13T12:55:00Z
6
value 0.00523
scoring_system epss
scoring_elements 0.66964
published_at 2026-04-11T12:55:00Z
7
value 0.00523
scoring_system epss
scoring_elements 0.66951
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-42799
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42799
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42824
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46691
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140503
reference_id 2140503
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140503
8
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
9
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
10
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
12
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
aliases CVE-2022-42799
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ryxv-e8de-q7h8
181
url VCID-rzp6-zzmc-cff3
vulnerability_id VCID-rzp6-zzmc-cff3
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9862.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9862.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9862
reference_id
reference_type
scores
0
value 0.00377
scoring_system epss
scoring_elements 0.59176
published_at 2026-04-01T12:55:00Z
1
value 0.00377
scoring_system epss
scoring_elements 0.59249
published_at 2026-04-02T12:55:00Z
2
value 0.00377
scoring_system epss
scoring_elements 0.59272
published_at 2026-04-04T12:55:00Z
3
value 0.00377
scoring_system epss
scoring_elements 0.59237
published_at 2026-04-07T12:55:00Z
4
value 0.00377
scoring_system epss
scoring_elements 0.59287
published_at 2026-04-08T12:55:00Z
5
value 0.00377
scoring_system epss
scoring_elements 0.59301
published_at 2026-04-09T12:55:00Z
6
value 0.00377
scoring_system epss
scoring_elements 0.59319
published_at 2026-04-11T12:55:00Z
7
value 0.00377
scoring_system epss
scoring_elements 0.59303
published_at 2026-04-12T12:55:00Z
8
value 0.00377
scoring_system epss
scoring_elements 0.59285
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9862
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9862
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9893
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9894
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9895
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9915
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9925
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9952
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879532
reference_id 1879532
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879532
11
reference_url https://security.gentoo.org/glsa/202007-61
reference_id GLSA-202007-61
reference_type
scores
url https://security.gentoo.org/glsa/202007-61
12
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
13
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
14
reference_url https://usn.ubuntu.com/4444-1/
reference_id USN-4444-1
reference_type
scores
url https://usn.ubuntu.com/4444-1/
fixed_packages
aliases CVE-2020-9862
risk_score 3.5
exploitability 0.5
weighted_severity 7.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-rzp6-zzmc-cff3
182
url VCID-s239-gjv2-qqdg
vulnerability_id VCID-s239-gjv2-qqdg
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32792.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32792.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32792
reference_id
reference_type
scores
0
value 0.00295
scoring_system epss
scoring_elements 0.52775
published_at 2026-04-13T12:55:00Z
1
value 0.00295
scoring_system epss
scoring_elements 0.52719
published_at 2026-04-02T12:55:00Z
2
value 0.00295
scoring_system epss
scoring_elements 0.52746
published_at 2026-04-04T12:55:00Z
3
value 0.00295
scoring_system epss
scoring_elements 0.52711
published_at 2026-04-07T12:55:00Z
4
value 0.00295
scoring_system epss
scoring_elements 0.52762
published_at 2026-04-08T12:55:00Z
5
value 0.00295
scoring_system epss
scoring_elements 0.52757
published_at 2026-04-09T12:55:00Z
6
value 0.00295
scoring_system epss
scoring_elements 0.52807
published_at 2026-04-11T12:55:00Z
7
value 0.00295
scoring_system epss
scoring_elements 0.52791
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32792
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238973
reference_id 2238973
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238973
7
reference_url https://security.archlinux.org/AVG-2789
reference_id AVG-2789
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2789
8
reference_url https://security.archlinux.org/AVG-2790
reference_id AVG-2790
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2790
9
reference_url https://security.archlinux.org/AVG-2791
reference_id AVG-2791
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2791
10
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
11
reference_url https://support.apple.com/en-us/HT213340
reference_id HT213340
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/
url https://support.apple.com/en-us/HT213340
12
reference_url https://support.apple.com/en-us/HT213341
reference_id HT213341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/
url https://support.apple.com/en-us/HT213341
13
reference_url https://support.apple.com/en-us/HT213342
reference_id HT213342
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/
url https://support.apple.com/en-us/HT213342
14
reference_url https://support.apple.com/en-us/HT213346
reference_id HT213346
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-22T19:40:52Z/
url https://support.apple.com/en-us/HT213346
15
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
16
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/5568-1/
reference_id USN-5568-1
reference_type
scores
url https://usn.ubuntu.com/5568-1/
fixed_packages
aliases CVE-2022-32792
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s239-gjv2-qqdg
183
url VCID-s51n-1ms6-xydk
vulnerability_id VCID-s51n-1ms6-xydk
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1871.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1871.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1871
reference_id
reference_type
scores
0
value 0.00794
scoring_system epss
scoring_elements 0.739
published_at 2026-04-01T12:55:00Z
1
value 0.00794
scoring_system epss
scoring_elements 0.73949
published_at 2026-04-13T12:55:00Z
2
value 0.00794
scoring_system epss
scoring_elements 0.7391
published_at 2026-04-02T12:55:00Z
3
value 0.00794
scoring_system epss
scoring_elements 0.73934
published_at 2026-04-04T12:55:00Z
4
value 0.00794
scoring_system epss
scoring_elements 0.73905
published_at 2026-04-07T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73939
published_at 2026-04-08T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73953
published_at 2026-04-09T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73976
published_at 2026-04-11T12:55:00Z
8
value 0.00794
scoring_system epss
scoring_elements 0.73958
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1871
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1944867
reference_id 1944867
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1944867
8
reference_url https://security.archlinux.org/AVG-1744
reference_id AVG-1744
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1744
9
reference_url https://security.archlinux.org/AVG-1745
reference_id AVG-1745
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1745
10
reference_url https://www.debian.org/security/2021/dsa-4923
reference_id dsa-4923
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/
url https://www.debian.org/security/2021/dsa-4923
11
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
12
reference_url https://support.apple.com/en-us/HT212146
reference_id HT212146
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/
url https://support.apple.com/en-us/HT212146
13
reference_url https://support.apple.com/en-us/HT212147
reference_id HT212147
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/
url https://support.apple.com/en-us/HT212147
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/
reference_id L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-01-29T17:33:21Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3L6ZZOU5JS7E3RFYGLP7UFLXCG7TNLU/
15
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4939-1/
reference_id USN-4939-1
reference_type
scores
url https://usn.ubuntu.com/4939-1/
fixed_packages
aliases CVE-2021-1871
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-s51n-1ms6-xydk
184
url VCID-sby7-u527-fqfg
vulnerability_id VCID-sby7-u527-fqfg
summary webkitgtk: memory corruption issue leading to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32435.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32435.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32435
reference_id
reference_type
scores
0
value 0.00233
scoring_system epss
scoring_elements 0.46171
published_at 2026-04-02T12:55:00Z
1
value 0.00233
scoring_system epss
scoring_elements 0.46199
published_at 2026-04-13T12:55:00Z
2
value 0.00233
scoring_system epss
scoring_elements 0.46191
published_at 2026-04-04T12:55:00Z
3
value 0.00233
scoring_system epss
scoring_elements 0.46139
published_at 2026-04-07T12:55:00Z
4
value 0.00233
scoring_system epss
scoring_elements 0.46195
published_at 2026-04-08T12:55:00Z
5
value 0.00233
scoring_system epss
scoring_elements 0.46194
published_at 2026-04-09T12:55:00Z
6
value 0.00233
scoring_system epss
scoring_elements 0.46217
published_at 2026-04-11T12:55:00Z
7
value 0.00233
scoring_system epss
scoring_elements 0.46189
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32435
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218626
reference_id 2218626
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218626
14
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/
url https://support.apple.com/en-us/HT213670
15
reference_url https://support.apple.com/en-us/HT213671
reference_id HT213671
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/
url https://support.apple.com/en-us/HT213671
16
reference_url https://support.apple.com/en-us/HT213676
reference_id HT213676
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/
url https://support.apple.com/en-us/HT213676
17
reference_url https://support.apple.com/en-us/HT213811
reference_id HT213811
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-27T22:13:33Z/
url https://support.apple.com/en-us/HT213811
18
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
19
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
aliases CVE-2023-32435
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sby7-u527-fqfg
185
url VCID-sf71-zb7h-xycs
vulnerability_id VCID-sf71-zb7h-xycs
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9802.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9802.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9802
reference_id
reference_type
scores
0
value 0.41488
scoring_system epss
scoring_elements 0.97381
published_at 2026-04-01T12:55:00Z
1
value 0.41488
scoring_system epss
scoring_elements 0.97405
published_at 2026-04-13T12:55:00Z
2
value 0.41488
scoring_system epss
scoring_elements 0.97387
published_at 2026-04-02T12:55:00Z
3
value 0.41488
scoring_system epss
scoring_elements 0.97392
published_at 2026-04-04T12:55:00Z
4
value 0.41488
scoring_system epss
scoring_elements 0.97394
published_at 2026-04-07T12:55:00Z
5
value 0.41488
scoring_system epss
scoring_elements 0.97401
published_at 2026-04-09T12:55:00Z
6
value 0.41488
scoring_system epss
scoring_elements 0.97403
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9802
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879545
reference_id 1879545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879545
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://support.apple.com/HT211168
reference_id HT211168
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211168
16
reference_url https://support.apple.com/HT211171
reference_id HT211171
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211171
17
reference_url https://support.apple.com/HT211175
reference_id HT211175
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211175
18
reference_url https://support.apple.com/HT211177
reference_id HT211177
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211177
19
reference_url https://support.apple.com/HT211178
reference_id HT211178
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211178
20
reference_url https://support.apple.com/HT211179
reference_id HT211179
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211179
21
reference_url https://support.apple.com/HT211181
reference_id HT211181
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:32:41Z/
url https://support.apple.com/HT211181
22
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
aliases CVE-2020-9802
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sf71-zb7h-xycs
186
url VCID-shfm-129h-47ha
vulnerability_id VCID-shfm-129h-47ha
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32885.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32885
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.40756
published_at 2026-04-02T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40731
published_at 2026-04-13T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40784
published_at 2026-04-11T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40708
published_at 2026-04-07T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40758
published_at 2026-04-08T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40765
published_at 2026-04-09T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.4075
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32885
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236842
reference_id 2236842
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236842
13
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
14
reference_url https://support.apple.com/en-us/HT213341
reference_id HT213341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/
url https://support.apple.com/en-us/HT213341
15
reference_url https://support.apple.com/en-us/HT213346
reference_id HT213346
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-01-29T16:20:34Z/
url https://support.apple.com/en-us/HT213346
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
19
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
20
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
21
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
22
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
23
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
24
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
25
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
26
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
27
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2022-32885
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-shfm-129h-47ha
187
url VCID-sxja-mn3n-hkgt
vulnerability_id VCID-sxja-mn3n-hkgt
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30951.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30951.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30951
reference_id
reference_type
scores
0
value 0.00887
scoring_system epss
scoring_elements 0.75403
published_at 2026-04-01T12:55:00Z
1
value 0.00887
scoring_system epss
scoring_elements 0.75407
published_at 2026-04-02T12:55:00Z
2
value 0.00887
scoring_system epss
scoring_elements 0.75438
published_at 2026-04-04T12:55:00Z
3
value 0.00887
scoring_system epss
scoring_elements 0.75419
published_at 2026-04-07T12:55:00Z
4
value 0.00887
scoring_system epss
scoring_elements 0.75462
published_at 2026-04-08T12:55:00Z
5
value 0.00887
scoring_system epss
scoring_elements 0.75471
published_at 2026-04-09T12:55:00Z
6
value 0.00887
scoring_system epss
scoring_elements 0.75491
published_at 2026-04-11T12:55:00Z
7
value 0.00887
scoring_system epss
scoring_elements 0.75469
published_at 2026-04-12T12:55:00Z
8
value 0.00887
scoring_system epss
scoring_elements 0.75459
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30951
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044534
reference_id 2044534
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044534
13
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
14
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30951
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-sxja-mn3n-hkgt
188
url VCID-t6ad-d451-k3cy
vulnerability_id VCID-t6ad-d451-k3cy
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22624.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22624.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22624
reference_id
reference_type
scores
0
value 0.00456
scoring_system epss
scoring_elements 0.63902
published_at 2026-04-13T12:55:00Z
1
value 0.00456
scoring_system epss
scoring_elements 0.63884
published_at 2026-04-02T12:55:00Z
2
value 0.00456
scoring_system epss
scoring_elements 0.63911
published_at 2026-04-04T12:55:00Z
3
value 0.00456
scoring_system epss
scoring_elements 0.63868
published_at 2026-04-07T12:55:00Z
4
value 0.00456
scoring_system epss
scoring_elements 0.63919
published_at 2026-04-08T12:55:00Z
5
value 0.00456
scoring_system epss
scoring_elements 0.63936
published_at 2026-04-09T12:55:00Z
6
value 0.00456
scoring_system epss
scoring_elements 0.63949
published_at 2026-04-11T12:55:00Z
7
value 0.00456
scoring_system epss
scoring_elements 0.63935
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22624
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22624
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22628
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22629
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22662
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2073893
reference_id 2073893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2073893
8
reference_url https://security.archlinux.org/AVG-2703
reference_id AVG-2703
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2703
9
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
10
reference_url https://support.apple.com/en-us/HT213182
reference_id HT213182
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:07:51Z/
url https://support.apple.com/en-us/HT213182
11
reference_url https://support.apple.com/en-us/HT213186
reference_id HT213186
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:07:51Z/
url https://support.apple.com/en-us/HT213186
12
reference_url https://support.apple.com/en-us/HT213187
reference_id HT213187
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:T/P:M/B:A/M:M/D:T/2025-05-22T18:07:51Z/
url https://support.apple.com/en-us/HT213187
13
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
14
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
15
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
16
reference_url https://usn.ubuntu.com/5394-1/
reference_id USN-5394-1
reference_type
scores
url https://usn.ubuntu.com/5394-1/
fixed_packages
aliases CVE-2022-22624
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-t6ad-d451-k3cy
189
url VCID-tc8n-sk6n-z7f3
vulnerability_id VCID-tc8n-sk6n-z7f3
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30818.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30818.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30818
reference_id
reference_type
scores
0
value 0.00433
scoring_system epss
scoring_elements 0.62605
published_at 2026-04-01T12:55:00Z
1
value 0.00433
scoring_system epss
scoring_elements 0.62663
published_at 2026-04-02T12:55:00Z
2
value 0.00433
scoring_system epss
scoring_elements 0.62695
published_at 2026-04-04T12:55:00Z
3
value 0.00433
scoring_system epss
scoring_elements 0.6266
published_at 2026-04-07T12:55:00Z
4
value 0.00433
scoring_system epss
scoring_elements 0.62712
published_at 2026-04-08T12:55:00Z
5
value 0.00433
scoring_system epss
scoring_elements 0.62728
published_at 2026-04-09T12:55:00Z
6
value 0.00433
scoring_system epss
scoring_elements 0.62747
published_at 2026-04-11T12:55:00Z
7
value 0.00433
scoring_system epss
scoring_elements 0.62736
published_at 2026-04-12T12:55:00Z
8
value 0.00433
scoring_system epss
scoring_elements 0.62713
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30818
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034368
reference_id 2034368
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034368
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30818
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tc8n-sk6n-z7f3
190
url VCID-tmt1-qwc9-nfhs
vulnerability_id VCID-tmt1-qwc9-nfhs
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46698.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-46698.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-46698
reference_id
reference_type
scores
0
value 0.00969
scoring_system epss
scoring_elements 0.76564
published_at 2026-04-02T12:55:00Z
1
value 0.00969
scoring_system epss
scoring_elements 0.76613
published_at 2026-04-13T12:55:00Z
2
value 0.00969
scoring_system epss
scoring_elements 0.76593
published_at 2026-04-04T12:55:00Z
3
value 0.00969
scoring_system epss
scoring_elements 0.76573
published_at 2026-04-07T12:55:00Z
4
value 0.00969
scoring_system epss
scoring_elements 0.76605
published_at 2026-04-08T12:55:00Z
5
value 0.00969
scoring_system epss
scoring_elements 0.76617
published_at 2026-04-09T12:55:00Z
6
value 0.00969
scoring_system epss
scoring_elements 0.76643
published_at 2026-04-11T12:55:00Z
7
value 0.00969
scoring_system epss
scoring_elements 0.76623
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-46698
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42852
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42856
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42867
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46692
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46698
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46699
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-46700
9
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
10
reference_url http://seclists.org/fulldisclosure/2022/Dec/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/20
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2156992
reference_id 2156992
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2156992
12
reference_url http://seclists.org/fulldisclosure/2022/Dec/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/26
13
reference_url http://seclists.org/fulldisclosure/2022/Dec/27
reference_id 27
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/27
14
reference_url http://seclists.org/fulldisclosure/2022/Dec/28
reference_id 28
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url http://seclists.org/fulldisclosure/2022/Dec/28
15
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://security.gentoo.org/glsa/202305-32
16
reference_url https://support.apple.com/en-us/HT213530
reference_id HT213530
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213530
17
reference_url https://support.apple.com/en-us/HT213532
reference_id HT213532
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213532
18
reference_url https://support.apple.com/en-us/HT213535
reference_id HT213535
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213535
19
reference_url https://support.apple.com/en-us/HT213536
reference_id HT213536
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213536
20
reference_url https://support.apple.com/en-us/HT213537
reference_id HT213537
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213537
21
reference_url https://support.apple.com/en-us/HT213538
reference_id HT213538
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-21T13:47:18Z/
url https://support.apple.com/en-us/HT213538
22
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
23
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://usn.ubuntu.com/5797-1/
reference_id USN-5797-1
reference_type
scores
url https://usn.ubuntu.com/5797-1/
fixed_packages
aliases CVE-2022-46698
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tmt1-qwc9-nfhs
191
url VCID-tqb3-nabh-tkeh
vulnerability_id VCID-tqb3-nabh-tkeh
summary webkitgtk: data isolation bypass vulnerability
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-44309.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-44309
reference_id
reference_type
scores
0
value 0.01158
scoring_system epss
scoring_elements 0.78526
published_at 2026-04-02T12:55:00Z
1
value 0.01274
scoring_system epss
scoring_elements 0.79532
published_at 2026-04-13T12:55:00Z
2
value 0.01274
scoring_system epss
scoring_elements 0.79513
published_at 2026-04-04T12:55:00Z
3
value 0.01274
scoring_system epss
scoring_elements 0.79499
published_at 2026-04-07T12:55:00Z
4
value 0.01274
scoring_system epss
scoring_elements 0.79527
published_at 2026-04-08T12:55:00Z
5
value 0.01274
scoring_system epss
scoring_elements 0.79535
published_at 2026-04-09T12:55:00Z
6
value 0.01274
scoring_system epss
scoring_elements 0.79557
published_at 2026-04-11T12:55:00Z
7
value 0.01274
scoring_system epss
scoring_elements 0.7954
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-44309
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-44309
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121752
reference_id 121752
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121752
5
reference_url https://support.apple.com/en-us/121753
reference_id 121753
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121753
6
reference_url https://support.apple.com/en-us/121754
reference_id 121754
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121754
7
reference_url https://support.apple.com/en-us/121755
reference_id 121755
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121755
8
reference_url https://support.apple.com/en-us/121756
reference_id 121756
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:P/P:M/B:A/M:M/D:T/2024-11-23T04:55:45Z/
url https://support.apple.com/en-us/121756
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2327927
reference_id 2327927
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2327927
10
reference_url https://access.redhat.com/errata/RHSA-2024:10472
reference_id RHSA-2024:10472
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10472
11
reference_url https://access.redhat.com/errata/RHSA-2024:10480
reference_id RHSA-2024:10480
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10480
12
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
13
reference_url https://access.redhat.com/errata/RHSA-2024:10482
reference_id RHSA-2024:10482
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10482
14
reference_url https://access.redhat.com/errata/RHSA-2024:10483
reference_id RHSA-2024:10483
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10483
15
reference_url https://access.redhat.com/errata/RHSA-2024:10489
reference_id RHSA-2024:10489
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10489
16
reference_url https://access.redhat.com/errata/RHSA-2024:10492
reference_id RHSA-2024:10492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10492
17
reference_url https://access.redhat.com/errata/RHSA-2024:10496
reference_id RHSA-2024:10496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10496
18
reference_url https://access.redhat.com/errata/RHSA-2024:10501
reference_id RHSA-2024:10501
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10501
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/7142-1/
reference_id USN-7142-1
reference_type
scores
url https://usn.ubuntu.com/7142-1/
fixed_packages
aliases CVE-2024-44309
risk_score 10.0
exploitability 2.0
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tqb3-nabh-tkeh
192
url VCID-tyra-54yq-4ff6
vulnerability_id VCID-tyra-54yq-4ff6
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30823.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30823.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30823
reference_id
reference_type
scores
0
value 0.00173
scoring_system epss
scoring_elements 0.38602
published_at 2026-04-01T12:55:00Z
1
value 0.00173
scoring_system epss
scoring_elements 0.38731
published_at 2026-04-02T12:55:00Z
2
value 0.00173
scoring_system epss
scoring_elements 0.38753
published_at 2026-04-04T12:55:00Z
3
value 0.00173
scoring_system epss
scoring_elements 0.38682
published_at 2026-04-07T12:55:00Z
4
value 0.00173
scoring_system epss
scoring_elements 0.38733
published_at 2026-04-08T12:55:00Z
5
value 0.00173
scoring_system epss
scoring_elements 0.38743
published_at 2026-04-09T12:55:00Z
6
value 0.00173
scoring_system epss
scoring_elements 0.38754
published_at 2026-04-11T12:55:00Z
7
value 0.00173
scoring_system epss
scoring_elements 0.38717
published_at 2026-04-12T12:55:00Z
8
value 0.00173
scoring_system epss
scoring_elements 0.3869
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30823
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034373
reference_id 2034373
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034373
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30823
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-tyra-54yq-4ff6
193
url VCID-u1sp-38g8-xfan
vulnerability_id VCID-u1sp-38g8-xfan
summary Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-4558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-4558
reference_id
reference_type
scores
0
value 0.0238
scoring_system epss
scoring_elements 0.84992
published_at 2026-04-13T12:55:00Z
1
value 0.02579
scoring_system epss
scoring_elements 0.85554
published_at 2026-04-09T12:55:00Z
2
value 0.02579
scoring_system epss
scoring_elements 0.85566
published_at 2026-04-12T12:55:00Z
3
value 0.02579
scoring_system epss
scoring_elements 0.85568
published_at 2026-04-11T12:55:00Z
4
value 0.02579
scoring_system epss
scoring_elements 0.85503
published_at 2026-04-02T12:55:00Z
5
value 0.02579
scoring_system epss
scoring_elements 0.85519
published_at 2026-04-04T12:55:00Z
6
value 0.02579
scoring_system epss
scoring_elements 0.85524
published_at 2026-04-07T12:55:00Z
7
value 0.02579
scoring_system epss
scoring_elements 0.85544
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-4558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4558
3
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
4
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
5
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2279689
reference_id 2279689
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2279689
7
reference_url https://issues.chromium.org/issues/337766133
reference_id 337766133
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://issues.chromium.org/issues/337766133
8
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/
reference_id 6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6G7EYH2JAK5OJPVNC6AXYQ5K7YGYNCDN/
9
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/
reference_id BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BWFSZNNWSQYDRYKNLBDGEXXKMBXDYQ3F/
10
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/
reference_id FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FAWEKDQTHPN7NFEMLIWP7YMIZ2DHF36N/
11
reference_url https://security.gentoo.org/glsa/202412-05
reference_id GLSA-202412-05
reference_type
scores
url https://security.gentoo.org/glsa/202412-05
12
reference_url https://security.gentoo.org/glsa/202501-09
reference_id GLSA-202501-09
reference_type
scores
url https://security.gentoo.org/glsa/202501-09
13
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/
reference_id IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IPETICRXUOGRIM4U3BCRTIKE3IZWCSBT/
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/
reference_id LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LE3ASLH6QF2E5OVJI5VA3JSEPJFFFMNY/
15
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
16
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
17
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
18
reference_url https://access.redhat.com/errata/RHSA-2024:9144
reference_id RHSA-2024:9144
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9144
19
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
20
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
21
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
22
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
23
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
24
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
25
reference_url https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html
reference_id stable-channel-update-for-desktop_7.html
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-05-09T04:00:46Z/
url https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_7.html
26
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
aliases CVE-2024-4558
risk_score 3.4
exploitability 0.5
weighted_severity 6.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u1sp-38g8-xfan
194
url VCID-u9g4-5f16-yqc9
vulnerability_id VCID-u9g4-5f16-yqc9
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24209.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24209
reference_id
reference_type
scores
0
value 0.02557
scoring_system epss
scoring_elements 0.85507
published_at 2026-04-13T12:55:00Z
1
value 0.02557
scoring_system epss
scoring_elements 0.85465
published_at 2026-04-04T12:55:00Z
2
value 0.02557
scoring_system epss
scoring_elements 0.85468
published_at 2026-04-07T12:55:00Z
3
value 0.02557
scoring_system epss
scoring_elements 0.85489
published_at 2026-04-08T12:55:00Z
4
value 0.02557
scoring_system epss
scoring_elements 0.85497
published_at 2026-04-09T12:55:00Z
5
value 0.02557
scoring_system epss
scoring_elements 0.85512
published_at 2026-04-11T12:55:00Z
6
value 0.02557
scoring_system epss
scoring_elements 0.8551
published_at 2026-04-12T12:55:00Z
7
value 0.03379
scoring_system epss
scoring_elements 0.87339
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24209
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24209
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122371
reference_id 122371
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122371
5
reference_url https://support.apple.com/en-us/122372
reference_id 122372
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122372
6
reference_url https://support.apple.com/en-us/122373
reference_id 122373
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122373
7
reference_url https://support.apple.com/en-us/122376
reference_id 122376
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122376
8
reference_url https://support.apple.com/en-us/122377
reference_id 122377
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122377
9
reference_url https://support.apple.com/en-us/122379
reference_id 122379
reference_type
scores
0
value 7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-04-01T18:15:08Z/
url https://support.apple.com/en-us/122379
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2357911
reference_id 2357911
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2357911
11
reference_url https://security.gentoo.org/glsa/202511-02
reference_id GLSA-202511-02
reference_type
scores
url https://security.gentoo.org/glsa/202511-02
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:3713
reference_id RHSA-2025:3713
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3713
14
reference_url https://access.redhat.com/errata/RHSA-2025:3755
reference_id RHSA-2025:3755
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3755
15
reference_url https://access.redhat.com/errata/RHSA-2025:3756
reference_id RHSA-2025:3756
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3756
16
reference_url https://access.redhat.com/errata/RHSA-2025:3974
reference_id RHSA-2025:3974
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:3974
17
reference_url https://access.redhat.com/errata/RHSA-2025:4445
reference_id RHSA-2025:4445
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:4445
18
reference_url https://access.redhat.com/errata/RHSA-2025:7387
reference_id RHSA-2025:7387
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7387
19
reference_url https://access.redhat.com/errata/RHSA-2025:7998
reference_id RHSA-2025:7998
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:7998
20
reference_url https://access.redhat.com/errata/RHSA-2025:8064
reference_id RHSA-2025:8064
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8064
21
reference_url https://access.redhat.com/errata/RHSA-2025:8065
reference_id RHSA-2025:8065
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8065
22
reference_url https://access.redhat.com/errata/RHSA-2025:8066
reference_id RHSA-2025:8066
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8066
23
reference_url https://access.redhat.com/errata/RHSA-2025:8194
reference_id RHSA-2025:8194
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:8194
24
reference_url https://usn.ubuntu.com/7436-1/
reference_id USN-7436-1
reference_type
scores
url https://usn.ubuntu.com/7436-1/
fixed_packages
aliases CVE-2025-24209
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-u9g4-5f16-yqc9
195
url VCID-uugz-x8q6-fbe4
vulnerability_id VCID-uugz-x8q6-fbe4
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41993.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-41993.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-41993
reference_id
reference_type
scores
0
value 0.24414
scoring_system epss
scoring_elements 0.96109
published_at 2026-04-13T12:55:00Z
1
value 0.24414
scoring_system epss
scoring_elements 0.96101
published_at 2026-04-08T12:55:00Z
2
value 0.24414
scoring_system epss
scoring_elements 0.96104
published_at 2026-04-09T12:55:00Z
3
value 0.24414
scoring_system epss
scoring_elements 0.96107
published_at 2026-04-12T12:55:00Z
4
value 0.24891
scoring_system epss
scoring_elements 0.96134
published_at 2026-04-04T12:55:00Z
5
value 0.24891
scoring_system epss
scoring_elements 0.96127
published_at 2026-04-02T12:55:00Z
6
value 0.24891
scoring_system epss
scoring_elements 0.96139
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-41993
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2240522
reference_id 2240522
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2240522
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://support.apple.com/en-us/HT213940
reference_id HT213940
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/
url https://support.apple.com/en-us/HT213940
16
reference_url https://security.netapp.com/advisory/ntap-20240426-0004/
reference_id ntap-20240426-0004
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-11T02:17:52Z/
url https://security.netapp.com/advisory/ntap-20240426-0004/
17
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
18
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
20
reference_url https://usn.ubuntu.com/6426-1/
reference_id USN-6426-1
reference_type
scores
url https://usn.ubuntu.com/6426-1/
fixed_packages
aliases CVE-2023-41993
risk_score 10.0
exploitability 2.0
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-uugz-x8q6-fbe4
196
url VCID-v1he-6exf-b7dt
vulnerability_id VCID-v1he-6exf-b7dt
summary webkitgtk: Processing web content may lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-27820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-27820
reference_id
reference_type
scores
0
value 0.01283
scoring_system epss
scoring_elements 0.79595
published_at 2026-04-13T12:55:00Z
1
value 0.01283
scoring_system epss
scoring_elements 0.79574
published_at 2026-04-04T12:55:00Z
2
value 0.01283
scoring_system epss
scoring_elements 0.79562
published_at 2026-04-07T12:55:00Z
3
value 0.01283
scoring_system epss
scoring_elements 0.7959
published_at 2026-04-08T12:55:00Z
4
value 0.01283
scoring_system epss
scoring_elements 0.79597
published_at 2026-04-09T12:55:00Z
5
value 0.01283
scoring_system epss
scoring_elements 0.79618
published_at 2026-04-11T12:55:00Z
6
value 0.01283
scoring_system epss
scoring_elements 0.79603
published_at 2026-04-12T12:55:00Z
7
value 0.01303
scoring_system epss
scoring_elements 0.79704
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-27820
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27808
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27820
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27833
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27834
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120896
reference_id 120896
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120896
8
reference_url https://support.apple.com/en-us/120898
reference_id 120898
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120898
9
reference_url https://support.apple.com/en-us/120901
reference_id 120901
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120901
10
reference_url https://support.apple.com/en-us/120902
reference_id 120902
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120902
11
reference_url https://support.apple.com/en-us/120903
reference_id 120903
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120903
12
reference_url https://support.apple.com/en-us/120905
reference_id 120905
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120905
13
reference_url https://support.apple.com/en-us/120906
reference_id 120906
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/120906
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314698
reference_id 2314698
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314698
15
reference_url http://seclists.org/fulldisclosure/2024/Jun/5
reference_id 5
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url http://seclists.org/fulldisclosure/2024/Jun/5
16
reference_url https://support.apple.com/en-us/HT214100
reference_id HT214100
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214100
17
reference_url https://support.apple.com/en-us/HT214101
reference_id HT214101
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214101
18
reference_url https://support.apple.com/en-us/HT214102
reference_id HT214102
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214102
19
reference_url https://support.apple.com/en-us/HT214103
reference_id HT214103
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214103
20
reference_url https://support.apple.com/en-us/HT214104
reference_id HT214104
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214104
21
reference_url https://support.apple.com/en-us/HT214106
reference_id HT214106
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214106
22
reference_url https://support.apple.com/en-us/HT214108
reference_id HT214108
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-06-12T13:40:12Z/
url https://support.apple.com/en-us/HT214108
23
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
24
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
25
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
26
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
27
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
28
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
29
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
30
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
31
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-27820
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v1he-6exf-b7dt
197
url VCID-v6kn-1ygj-8kfe
vulnerability_id VCID-v6kn-1ygj-8kfe
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30734.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30734.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30734
reference_id
reference_type
scores
0
value 0.01081
scoring_system epss
scoring_elements 0.77787
published_at 2026-04-01T12:55:00Z
1
value 0.01081
scoring_system epss
scoring_elements 0.77847
published_at 2026-04-13T12:55:00Z
2
value 0.01081
scoring_system epss
scoring_elements 0.77837
published_at 2026-04-09T12:55:00Z
3
value 0.01081
scoring_system epss
scoring_elements 0.77863
published_at 2026-04-11T12:55:00Z
4
value 0.01081
scoring_system epss
scoring_elements 0.77793
published_at 2026-04-02T12:55:00Z
5
value 0.01081
scoring_system epss
scoring_elements 0.77821
published_at 2026-04-04T12:55:00Z
6
value 0.01081
scoring_system epss
scoring_elements 0.77804
published_at 2026-04-07T12:55:00Z
7
value 0.01081
scoring_system epss
scoring_elements 0.77832
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30734
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21775
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21779
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30663
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30665
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30689
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30720
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30734
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30744
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30749
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30758
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30795
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30797
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30799
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986886
reference_id 1986886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986886
16
reference_url https://security.archlinux.org/ASA-202107-67
reference_id ASA-202107-67
reference_type
scores
url https://security.archlinux.org/ASA-202107-67
17
reference_url https://security.archlinux.org/ASA-202107-68
reference_id ASA-202107-68
reference_type
scores
url https://security.archlinux.org/ASA-202107-68
18
reference_url https://security.archlinux.org/AVG-2220
reference_id AVG-2220
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2220
19
reference_url https://security.archlinux.org/AVG-2221
reference_id AVG-2221
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2221
20
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
21
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
22
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
23
reference_url https://usn.ubuntu.com/5024-1/
reference_id USN-5024-1
reference_type
scores
url https://usn.ubuntu.com/5024-1/
fixed_packages
aliases CVE-2021-30734
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-v6kn-1ygj-8kfe
198
url VCID-vbyq-sqqw-c3bm
vulnerability_id VCID-vbyq-sqqw-c3bm
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23252.json
reference_id
reference_type
scores
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23252.json
1
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270288
reference_id 2270288
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270288
3
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
4
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
5
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
6
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
7
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
aliases CVE-2024-23252
risk_score 1.6
exploitability 0.5
weighted_severity 3.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vbyq-sqqw-c3bm
199
url VCID-vh6x-1uak-6bh4
vulnerability_id VCID-vh6x-1uak-6bh4
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9843.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9843.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9843
reference_id
reference_type
scores
0
value 0.00708
scoring_system epss
scoring_elements 0.72147
published_at 2026-04-01T12:55:00Z
1
value 0.00708
scoring_system epss
scoring_elements 0.72193
published_at 2026-04-13T12:55:00Z
2
value 0.00708
scoring_system epss
scoring_elements 0.72222
published_at 2026-04-11T12:55:00Z
3
value 0.00708
scoring_system epss
scoring_elements 0.72206
published_at 2026-04-12T12:55:00Z
4
value 0.00708
scoring_system epss
scoring_elements 0.72153
published_at 2026-04-02T12:55:00Z
5
value 0.00708
scoring_system epss
scoring_elements 0.72173
published_at 2026-04-04T12:55:00Z
6
value 0.00708
scoring_system epss
scoring_elements 0.72151
published_at 2026-04-07T12:55:00Z
7
value 0.00708
scoring_system epss
scoring_elements 0.72187
published_at 2026-04-08T12:55:00Z
8
value 0.00708
scoring_system epss
scoring_elements 0.72199
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9843
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879566
reference_id 1879566
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879566
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
aliases CVE-2020-9843
risk_score 4.5
exploitability 0.5
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh6x-1uak-6bh4
200
url VCID-vh6y-51ne-cuhh
vulnerability_id VCID-vh6y-51ne-cuhh
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1745.json
reference_id
reference_type
scores
0
value 7.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2014-1745.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2014-1745
reference_id
reference_type
scores
0
value 0.00802
scoring_system epss
scoring_elements 0.74093
published_at 2026-04-13T12:55:00Z
1
value 0.00802
scoring_system epss
scoring_elements 0.74045
published_at 2026-04-01T12:55:00Z
2
value 0.00802
scoring_system epss
scoring_elements 0.74051
published_at 2026-04-02T12:55:00Z
3
value 0.00802
scoring_system epss
scoring_elements 0.74077
published_at 2026-04-04T12:55:00Z
4
value 0.00802
scoring_system epss
scoring_elements 0.74048
published_at 2026-04-07T12:55:00Z
5
value 0.00802
scoring_system epss
scoring_elements 0.74081
published_at 2026-04-08T12:55:00Z
6
value 0.00802
scoring_system epss
scoring_elements 0.74096
published_at 2026-04-09T12:55:00Z
7
value 0.00802
scoring_system epss
scoring_elements 0.74117
published_at 2026-04-11T12:55:00Z
8
value 0.00802
scoring_system epss
scoring_elements 0.74099
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2014-1745
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1743
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1744
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1744
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1746
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1746
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1747
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1747
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1748
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1749
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1749
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3152
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3152
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3803
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
20
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
21
reference_url http://www.securitytracker.com/id/1030270
reference_id 1030270
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://www.securitytracker.com/id/1030270
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270151
reference_id 2270151
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270151
23
reference_url http://secunia.com/advisories/58920
reference_id 58920
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://secunia.com/advisories/58920
24
reference_url http://secunia.com/advisories/59155
reference_id 59155
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://secunia.com/advisories/59155
25
reference_url http://www.openwall.com/lists/oss-security/2024/02/05/8
reference_id 8
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://www.openwall.com/lists/oss-security/2024/02/05/8
26
reference_url https://src.chromium.org/viewvc/blink?revision=167993&view=revision
reference_id blink?revision=167993&view=revision
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url https://src.chromium.org/viewvc/blink?revision=167993&view=revision
27
reference_url https://code.google.com/p/chromium/issues/detail?id=346192
reference_id detail?id=346192
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url https://code.google.com/p/chromium/issues/detail?id=346192
28
reference_url http://www.debian.org/security/2014/dsa-2939
reference_id dsa-2939
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://www.debian.org/security/2014/dsa-2939
29
reference_url https://security.gentoo.org/glsa/201408-16
reference_id GLSA-201408-16
reference_type
scores
url https://security.gentoo.org/glsa/201408-16
30
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
31
reference_url http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
reference_id msg00023.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://lists.opensuse.org/opensuse-updates/2014-06/msg00023.html
32
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
33
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
reference_id stable-channel-update_20.html
reference_type
scores
0
value 7.1
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-06-04T15:40:21Z/
url http://googlechromereleases.blogspot.com/2014/05/stable-channel-update_20.html
fixed_packages
aliases CVE-2014-1745
risk_score 3.2
exploitability 0.5
weighted_severity 6.4
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vh6y-51ne-cuhh
201
url VCID-vqd7-gwyv-vfaf
vulnerability_id VCID-vqd7-gwyv-vfaf
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23254.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23254.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23254
reference_id
reference_type
scores
0
value 0.00468
scoring_system epss
scoring_elements 0.64466
published_at 2026-04-13T12:55:00Z
1
value 0.00468
scoring_system epss
scoring_elements 0.64494
published_at 2026-04-12T12:55:00Z
2
value 0.00468
scoring_system epss
scoring_elements 0.64506
published_at 2026-04-11T12:55:00Z
3
value 0.00468
scoring_system epss
scoring_elements 0.6449
published_at 2026-04-09T12:55:00Z
4
value 0.00468
scoring_system epss
scoring_elements 0.64474
published_at 2026-04-08T12:55:00Z
5
value 0.00468
scoring_system epss
scoring_elements 0.64426
published_at 2026-04-07T12:55:00Z
6
value 0.00468
scoring_system epss
scoring_elements 0.64467
published_at 2026-04-04T12:55:00Z
7
value 0.00508
scoring_system epss
scoring_elements 0.66263
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23254
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42843
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42950
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42956
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43010
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23254
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23263
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23280
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23284
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54658
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2024/03/26/1
reference_id 1
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://www.openwall.com/lists/oss-security/2024/03/26/1
13
reference_url https://support.apple.com/en-us/120881
reference_id 120881
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120881
14
reference_url https://support.apple.com/en-us/120882
reference_id 120882
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120882
15
reference_url https://support.apple.com/en-us/120883
reference_id 120883
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120883
16
reference_url https://support.apple.com/en-us/120893
reference_id 120893
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120893
17
reference_url https://support.apple.com/en-us/120894
reference_id 120894
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120894
18
reference_url https://support.apple.com/en-us/120895
reference_id 120895
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/120895
19
reference_url http://seclists.org/fulldisclosure/2024/Mar/20
reference_id 20
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/20
20
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2270289
reference_id 2270289
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2270289
21
reference_url http://seclists.org/fulldisclosure/2024/Mar/24
reference_id 24
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/24
22
reference_url http://seclists.org/fulldisclosure/2024/Mar/25
reference_id 25
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/25
23
reference_url http://seclists.org/fulldisclosure/2024/Mar/26
reference_id 26
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url http://seclists.org/fulldisclosure/2024/Mar/26
24
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
25
reference_url https://support.apple.com/en-us/HT214081
reference_id HT214081
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214081
26
reference_url https://support.apple.com/en-us/HT214084
reference_id HT214084
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214084
27
reference_url https://support.apple.com/en-us/HT214086
reference_id HT214086
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214086
28
reference_url https://support.apple.com/en-us/HT214087
reference_id HT214087
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214087
29
reference_url https://support.apple.com/en-us/HT214088
reference_id HT214088
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214088
30
reference_url https://support.apple.com/en-us/HT214089
reference_id HT214089
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://support.apple.com/en-us/HT214089
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
reference_id IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-03-08T15:22:13Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IXLXIOAH5S7J22LJTCIAVFVVJ4TESAX4/
32
reference_url https://access.redhat.com/errata/RHSA-2024:10481
reference_id RHSA-2024:10481
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:10481
33
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
34
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
35
reference_url https://usn.ubuntu.com/6732-1/
reference_id USN-6732-1
reference_type
scores
url https://usn.ubuntu.com/6732-1/
fixed_packages
aliases CVE-2024-23254
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vqd7-gwyv-vfaf
202
url VCID-vt3f-hrb1-33cw
vulnerability_id VCID-vt3f-hrb1-33cw
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38594.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38594
reference_id
reference_type
scores
0
value 0.00437
scoring_system epss
scoring_elements 0.63041
published_at 2026-04-02T12:55:00Z
1
value 0.00437
scoring_system epss
scoring_elements 0.63069
published_at 2026-04-04T12:55:00Z
2
value 0.00437
scoring_system epss
scoring_elements 0.63033
published_at 2026-04-07T12:55:00Z
3
value 0.00437
scoring_system epss
scoring_elements 0.63084
published_at 2026-04-08T12:55:00Z
4
value 0.00437
scoring_system epss
scoring_elements 0.63101
published_at 2026-04-09T12:55:00Z
5
value 0.00525
scoring_system epss
scoring_elements 0.6698
published_at 2026-04-13T12:55:00Z
6
value 0.00525
scoring_system epss
scoring_elements 0.67025
published_at 2026-04-11T12:55:00Z
7
value 0.00525
scoring_system epss
scoring_elements 0.67011
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38594
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231018
reference_id 2231018
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231018
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
18
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
19
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
20
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
21
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
22
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38594
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vt3f-hrb1-33cw
203
url VCID-vwaa-vyn9-d3ey
vulnerability_id VCID-vwaa-vyn9-d3ey
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-38595.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-38595
reference_id
reference_type
scores
0
value 0.00611
scoring_system epss
scoring_elements 0.6978
published_at 2026-04-13T12:55:00Z
1
value 0.00611
scoring_system epss
scoring_elements 0.6981
published_at 2026-04-11T12:55:00Z
2
value 0.00611
scoring_system epss
scoring_elements 0.69795
published_at 2026-04-12T12:55:00Z
3
value 0.00992
scoring_system epss
scoring_elements 0.76878
published_at 2026-04-08T12:55:00Z
4
value 0.00992
scoring_system epss
scoring_elements 0.76889
published_at 2026-04-09T12:55:00Z
5
value 0.00992
scoring_system epss
scoring_elements 0.76836
published_at 2026-04-02T12:55:00Z
6
value 0.00992
scoring_system epss
scoring_elements 0.76865
published_at 2026-04-04T12:55:00Z
7
value 0.00992
scoring_system epss
scoring_elements 0.76847
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-38595
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2231019
reference_id 2231019
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2231019
15
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
16
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
17
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
18
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
19
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/6289-1/
reference_id USN-6289-1
reference_type
scores
url https://usn.ubuntu.com/6289-1/
fixed_packages
aliases CVE-2023-38595
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vwaa-vyn9-d3ey
204
url VCID-vy4b-6bqk-8ka1
vulnerability_id VCID-vy4b-6bqk-8ka1
summary webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45481.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-45481.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-45481
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07937
published_at 2026-04-01T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.08036
published_at 2026-04-02T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.08079
published_at 2026-04-04T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.08042
published_at 2026-04-07T12:55:00Z
4
value 0.00028
scoring_system epss
scoring_elements 0.08102
published_at 2026-04-08T12:55:00Z
5
value 0.00028
scoring_system epss
scoring_elements 0.08124
published_at 2026-04-09T12:55:00Z
6
value 0.00028
scoring_system epss
scoring_elements 0.08115
published_at 2026-04-11T12:55:00Z
7
value 0.00028
scoring_system epss
scoring_elements 0.08095
published_at 2026-04-12T12:55:00Z
8
value 0.00028
scoring_system epss
scoring_elements 0.08078
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-45481
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2040327
reference_id 2040327
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2040327
13
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-45481
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-vy4b-6bqk-8ka1
205
url VCID-w98c-tpu4-ufa2
vulnerability_id VCID-w98c-tpu4-ufa2
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26719.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-26719.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-26719
reference_id
reference_type
scores
0
value 0.00275
scoring_system epss
scoring_elements 0.50949
published_at 2026-04-04T12:55:00Z
1
value 0.00275
scoring_system epss
scoring_elements 0.50961
published_at 2026-04-09T12:55:00Z
2
value 0.00275
scoring_system epss
scoring_elements 0.50963
published_at 2026-04-08T12:55:00Z
3
value 0.00275
scoring_system epss
scoring_elements 0.50923
published_at 2026-04-02T12:55:00Z
4
value 0.00275
scoring_system epss
scoring_elements 0.50906
published_at 2026-04-07T12:55:00Z
5
value 0.00348
scoring_system epss
scoring_elements 0.57359
published_at 2026-04-13T12:55:00Z
6
value 0.00348
scoring_system epss
scoring_elements 0.57399
published_at 2026-04-11T12:55:00Z
7
value 0.00348
scoring_system epss
scoring_elements 0.57379
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-26719
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26700
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26709
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26716
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26717
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26719
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30293
8
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
9
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2092736
reference_id 2092736
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2092736
10
reference_url https://security.archlinux.org/AVG-2758
reference_id AVG-2758
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2758
11
reference_url https://security.archlinux.org/AVG-2759
reference_id AVG-2759
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2759
12
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
13
reference_url https://support.apple.com/en-us/HT213253
reference_id HT213253
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/
url https://support.apple.com/en-us/HT213253
14
reference_url https://support.apple.com/en-us/HT213254
reference_id HT213254
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/
url https://support.apple.com/en-us/HT213254
15
reference_url https://support.apple.com/en-us/HT213257
reference_id HT213257
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/
url https://support.apple.com/en-us/HT213257
16
reference_url https://support.apple.com/en-us/HT213258
reference_id HT213258
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/
url https://support.apple.com/en-us/HT213258
17
reference_url https://support.apple.com/en-us/HT213260
reference_id HT213260
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-06T14:21:07Z/
url https://support.apple.com/en-us/HT213260
18
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
19
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
21
reference_url https://usn.ubuntu.com/5457-1/
reference_id USN-5457-1
reference_type
scores
url https://usn.ubuntu.com/5457-1/
fixed_packages
aliases CVE-2022-26719
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-w98c-tpu4-ufa2
206
url VCID-wav5-7p9t-qka9
vulnerability_id VCID-wav5-7p9t-qka9
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13543.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13543.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13543
reference_id
reference_type
scores
0
value 0.01497
scoring_system epss
scoring_elements 0.81049
published_at 2026-04-01T12:55:00Z
1
value 0.01497
scoring_system epss
scoring_elements 0.81113
published_at 2026-04-13T12:55:00Z
2
value 0.01497
scoring_system epss
scoring_elements 0.81134
published_at 2026-04-11T12:55:00Z
3
value 0.01497
scoring_system epss
scoring_elements 0.8112
published_at 2026-04-12T12:55:00Z
4
value 0.01497
scoring_system epss
scoring_elements 0.81058
published_at 2026-04-02T12:55:00Z
5
value 0.01497
scoring_system epss
scoring_elements 0.81082
published_at 2026-04-07T12:55:00Z
6
value 0.01497
scoring_system epss
scoring_elements 0.8111
published_at 2026-04-08T12:55:00Z
7
value 0.01497
scoring_system epss
scoring_elements 0.81116
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13543
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1903568
reference_id 1903568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1903568
15
reference_url https://security.archlinux.org/ASA-202011-28
reference_id ASA-202011-28
reference_type
scores
url https://security.archlinux.org/ASA-202011-28
16
reference_url https://security.archlinux.org/AVG-1291
reference_id AVG-1291
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1291
17
reference_url https://security.gentoo.org/glsa/202012-10
reference_id GLSA-202012-10
reference_type
scores
url https://security.gentoo.org/glsa/202012-10
18
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
19
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2020-13543
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wav5-7p9t-qka9
207
url VCID-wbn4-ea3w-k7f3
vulnerability_id VCID-wbn4-ea3w-k7f3
summary webkitgtk: Processing web content may lead to a denial-of-service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2025-24158.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2025-24158
reference_id
reference_type
scores
0
value 0.0086
scoring_system epss
scoring_elements 0.74985
published_at 2026-04-02T12:55:00Z
1
value 0.0086
scoring_system epss
scoring_elements 0.75025
published_at 2026-04-13T12:55:00Z
2
value 0.0086
scoring_system epss
scoring_elements 0.75014
published_at 2026-04-04T12:55:00Z
3
value 0.0086
scoring_system epss
scoring_elements 0.7499
published_at 2026-04-07T12:55:00Z
4
value 0.0086
scoring_system epss
scoring_elements 0.75024
published_at 2026-04-08T12:55:00Z
5
value 0.0086
scoring_system epss
scoring_elements 0.75036
published_at 2026-04-12T12:55:00Z
6
value 0.0086
scoring_system epss
scoring_elements 0.75057
published_at 2026-04-11T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2025-24158
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24158
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/122066
reference_id 122066
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122066
5
reference_url https://support.apple.com/en-us/122068
reference_id 122068
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122068
6
reference_url https://support.apple.com/en-us/122071
reference_id 122071
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122071
7
reference_url https://support.apple.com/en-us/122072
reference_id 122072
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122072
8
reference_url https://support.apple.com/en-us/122073
reference_id 122073
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122073
9
reference_url https://support.apple.com/en-us/122074
reference_id 122074
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-28T15:43:06Z/
url https://support.apple.com/en-us/122074
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2344623
reference_id 2344623
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2344623
11
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
12
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
13
reference_url https://access.redhat.com/errata/RHSA-2025:2034
reference_id RHSA-2025:2034
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:2034
14
reference_url https://usn.ubuntu.com/7279-1/
reference_id USN-7279-1
reference_type
scores
url https://usn.ubuntu.com/7279-1/
fixed_packages
aliases CVE-2025-24158
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wbn4-ea3w-k7f3
208
url VCID-wc2v-987f-mqhn
vulnerability_id VCID-wc2v-987f-mqhn
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1820.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-1820.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-1820
reference_id
reference_type
scores
0
value 0.0077
scoring_system epss
scoring_elements 0.73469
published_at 2026-04-01T12:55:00Z
1
value 0.0077
scoring_system epss
scoring_elements 0.73519
published_at 2026-04-13T12:55:00Z
2
value 0.0077
scoring_system epss
scoring_elements 0.73546
published_at 2026-04-11T12:55:00Z
3
value 0.0077
scoring_system epss
scoring_elements 0.73527
published_at 2026-04-12T12:55:00Z
4
value 0.0077
scoring_system epss
scoring_elements 0.73478
published_at 2026-04-02T12:55:00Z
5
value 0.0077
scoring_system epss
scoring_elements 0.73501
published_at 2026-04-04T12:55:00Z
6
value 0.0077
scoring_system epss
scoring_elements 0.73472
published_at 2026-04-07T12:55:00Z
7
value 0.0077
scoring_system epss
scoring_elements 0.73508
published_at 2026-04-08T12:55:00Z
8
value 0.0077
scoring_system epss
scoring_elements 0.73522
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-1820
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986856
reference_id 1986856
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986856
14
reference_url https://security.archlinux.org/AVG-2208
reference_id AVG-2208
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2208
15
reference_url https://security.archlinux.org/AVG-2209
reference_id AVG-2209
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2209
16
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
17
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-1820
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wc2v-987f-mqhn
209
url VCID-wfjx-2djn-tket
vulnerability_id VCID-wfjx-2djn-tket
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32891.json
reference_id
reference_type
scores
0
value 6.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32891.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32891
reference_id
reference_type
scores
0
value 0.00088
scoring_system epss
scoring_elements 0.25054
published_at 2026-04-13T12:55:00Z
1
value 0.00088
scoring_system epss
scoring_elements 0.25209
published_at 2026-04-02T12:55:00Z
2
value 0.00088
scoring_system epss
scoring_elements 0.2525
published_at 2026-04-04T12:55:00Z
3
value 0.00088
scoring_system epss
scoring_elements 0.25021
published_at 2026-04-07T12:55:00Z
4
value 0.00088
scoring_system epss
scoring_elements 0.25089
published_at 2026-04-08T12:55:00Z
5
value 0.00088
scoring_system epss
scoring_elements 0.25134
published_at 2026-04-09T12:55:00Z
6
value 0.00088
scoring_system epss
scoring_elements 0.25149
published_at 2026-04-11T12:55:00Z
7
value 0.00088
scoring_system epss
scoring_elements 0.25107
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32891
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32792
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32816
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32891
5
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 5.4
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2128647
reference_id 2128647
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2128647
7
reference_url https://security.archlinux.org/AVG-2819
reference_id AVG-2819
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2819
8
reference_url https://security.archlinux.org/AVG-2820
reference_id AVG-2820
reference_type
scores
0
value Unknown
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2820
9
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/
url https://security.gentoo.org/glsa/202305-32
10
reference_url https://support.apple.com/en-us/HT213442
reference_id HT213442
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/
url https://support.apple.com/en-us/HT213442
11
reference_url https://support.apple.com/en-us/HT213446
reference_id HT213446
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/
url https://support.apple.com/en-us/HT213446
12
reference_url https://support.apple.com/en-us/HT213486
reference_id HT213486
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/
url https://support.apple.com/en-us/HT213486
13
reference_url https://support.apple.com/en-us/HT213487
reference_id HT213487
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-03-11T15:56:50Z/
url https://support.apple.com/en-us/HT213487
14
reference_url https://access.redhat.com/errata/RHSA-2022:7704
reference_id RHSA-2022:7704
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:7704
15
reference_url https://access.redhat.com/errata/RHSA-2022:8054
reference_id RHSA-2022:8054
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:8054
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2022-32891
risk_score 2.8
exploitability 0.5
weighted_severity 5.5
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wfjx-2djn-tket
210
url VCID-wht8-k729-nyh9
vulnerability_id VCID-wht8-k729-nyh9
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22592.json
reference_id
reference_type
scores
0
value 8.1
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-22592.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-22592
reference_id
reference_type
scores
0
value 0.00178
scoring_system epss
scoring_elements 0.39394
published_at 2026-04-02T12:55:00Z
1
value 0.00178
scoring_system epss
scoring_elements 0.39417
published_at 2026-04-04T12:55:00Z
2
value 0.00178
scoring_system epss
scoring_elements 0.39332
published_at 2026-04-07T12:55:00Z
3
value 0.00178
scoring_system epss
scoring_elements 0.39387
published_at 2026-04-08T12:55:00Z
4
value 0.00178
scoring_system epss
scoring_elements 0.39404
published_at 2026-04-09T12:55:00Z
5
value 0.00178
scoring_system epss
scoring_elements 0.39415
published_at 2026-04-11T12:55:00Z
6
value 0.00178
scoring_system epss
scoring_elements 0.39376
published_at 2026-04-12T12:55:00Z
7
value 0.00178
scoring_system epss
scoring_elements 0.39357
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-22592
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22589
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22590
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22620
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2053185
reference_id 2053185
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2053185
8
reference_url https://security.gentoo.org/glsa/202208-39
reference_id GLSA-202208-39
reference_type
scores
url https://security.gentoo.org/glsa/202208-39
9
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
10
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
11
reference_url https://usn.ubuntu.com/5306-1/
reference_id USN-5306-1
reference_type
scores
url https://usn.ubuntu.com/5306-1/
fixed_packages
aliases CVE-2022-22592
risk_score 3.6
exploitability 0.5
weighted_severity 7.3
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wht8-k729-nyh9
211
url VCID-wn9z-vusf-yycn
vulnerability_id VCID-wn9z-vusf-yycn
summary webkitgtk: processing a malicious image may lead to a denial of service
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42883.json
reference_id
reference_type
scores
0
value 5.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42883.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42883
reference_id
reference_type
scores
0
value 0.00022
scoring_system epss
scoring_elements 0.05938
published_at 2026-04-02T12:55:00Z
1
value 0.00022
scoring_system epss
scoring_elements 0.06004
published_at 2026-04-13T12:55:00Z
2
value 0.00022
scoring_system epss
scoring_elements 0.0597
published_at 2026-04-04T12:55:00Z
3
value 0.00022
scoring_system epss
scoring_elements 0.05954
published_at 2026-04-07T12:55:00Z
4
value 0.00022
scoring_system epss
scoring_elements 0.05993
published_at 2026-04-08T12:55:00Z
5
value 0.00022
scoring_system epss
scoring_elements 0.06031
published_at 2026-04-09T12:55:00Z
6
value 0.00022
scoring_system epss
scoring_elements 0.06021
published_at 2026-04-11T12:55:00Z
7
value 0.00022
scoring_system epss
scoring_elements 0.06013
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42883
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42883
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url http://www.openwall.com/lists/oss-security/2023/12/18/1
reference_id 1
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://www.openwall.com/lists/oss-security/2023/12/18/1
5
reference_url http://seclists.org/fulldisclosure/2023/Dec/12
reference_id 12
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/12
6
reference_url http://seclists.org/fulldisclosure/2023/Dec/13
reference_id 13
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/13
7
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2254326
reference_id 2254326
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2254326
8
reference_url http://seclists.org/fulldisclosure/2023/Dec/6
reference_id 6
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/6
9
reference_url http://seclists.org/fulldisclosure/2023/Dec/7
reference_id 7
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/7
10
reference_url http://seclists.org/fulldisclosure/2023/Dec/8
reference_id 8
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/8
11
reference_url http://seclists.org/fulldisclosure/2023/Dec/9
reference_id 9
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url http://seclists.org/fulldisclosure/2023/Dec/9
12
reference_url https://www.debian.org/security/2023/dsa-5580
reference_id dsa-5580
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://www.debian.org/security/2023/dsa-5580
13
reference_url https://support.apple.com/en-us/HT214034
reference_id HT214034
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214034
14
reference_url https://support.apple.com/kb/HT214034
reference_id HT214034
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/kb/HT214034
15
reference_url https://support.apple.com/en-us/HT214035
reference_id HT214035
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214035
16
reference_url https://support.apple.com/en-us/HT214036
reference_id HT214036
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214036
17
reference_url https://support.apple.com/en-us/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214039
18
reference_url https://support.apple.com/kb/HT214039
reference_id HT214039
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/kb/HT214039
19
reference_url https://support.apple.com/en-us/HT214040
reference_id HT214040
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214040
20
reference_url https://support.apple.com/en-us/HT214041
reference_id HT214041
reference_type
scores
0
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-08-28T14:57:46Z/
url https://support.apple.com/en-us/HT214041
21
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
22
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/6582-1/
reference_id USN-6582-1
reference_type
scores
url https://usn.ubuntu.com/6582-1/
fixed_packages
aliases CVE-2023-42883
risk_score 2.5
exploitability 0.5
weighted_severity 5.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wn9z-vusf-yycn
212
url VCID-wpw7-2u4z-muey
vulnerability_id VCID-wpw7-2u4z-muey
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30884.json
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30884.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30884
reference_id
reference_type
scores
0
value 0.00165
scoring_system epss
scoring_elements 0.37518
published_at 2026-04-01T12:55:00Z
1
value 0.00165
scoring_system epss
scoring_elements 0.377
published_at 2026-04-02T12:55:00Z
2
value 0.00165
scoring_system epss
scoring_elements 0.37725
published_at 2026-04-04T12:55:00Z
3
value 0.00165
scoring_system epss
scoring_elements 0.37603
published_at 2026-04-07T12:55:00Z
4
value 0.00165
scoring_system epss
scoring_elements 0.37654
published_at 2026-04-08T12:55:00Z
5
value 0.00165
scoring_system epss
scoring_elements 0.37668
published_at 2026-04-09T12:55:00Z
6
value 0.00165
scoring_system epss
scoring_elements 0.37682
published_at 2026-04-11T12:55:00Z
7
value 0.00165
scoring_system epss
scoring_elements 0.37647
published_at 2026-04-12T12:55:00Z
8
value 0.00165
scoring_system epss
scoring_elements 0.3762
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30884
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30818
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30823
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30846
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30851
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30884
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30888
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30889
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42762
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45481
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45483
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2034378
reference_id 2034378
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2034378
14
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
15
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30884
risk_score 2.1
exploitability 0.5
weighted_severity 4.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-wpw7-2u4z-muey
213
url VCID-x25m-k9px-2ubs
vulnerability_id VCID-x25m-k9px-2ubs
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39928.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-39928.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-39928
reference_id
reference_type
scores
0
value 0.00175
scoring_system epss
scoring_elements 0.38955
published_at 2026-04-02T12:55:00Z
1
value 0.00175
scoring_system epss
scoring_elements 0.38974
published_at 2026-04-04T12:55:00Z
2
value 0.00175
scoring_system epss
scoring_elements 0.38904
published_at 2026-04-07T12:55:00Z
3
value 0.00175
scoring_system epss
scoring_elements 0.38957
published_at 2026-04-08T12:55:00Z
4
value 0.00175
scoring_system epss
scoring_elements 0.38971
published_at 2026-04-09T12:55:00Z
5
value 0.00175
scoring_system epss
scoring_elements 0.38983
published_at 2026-04-11T12:55:00Z
6
value 0.00175
scoring_system epss
scoring_elements 0.38945
published_at 2026-04-12T12:55:00Z
7
value 0.00175
scoring_system epss
scoring_elements 0.38918
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-39928
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1745
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32359
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39928
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40414
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41074
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41993
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42875
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42890
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42970
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2241400
reference_id 2241400
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2241400
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
16
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
17
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
18
reference_url https://usn.ubuntu.com/6426-1/
reference_id USN-6426-1
reference_type
scores
url https://usn.ubuntu.com/6426-1/
fixed_packages
aliases CVE-2023-39928
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x25m-k9px-2ubs
214
url VCID-x5us-y2sc-mkg5
vulnerability_id VCID-x5us-y2sc-mkg5
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30666.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30666.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30666
reference_id
reference_type
scores
0
value 0.01691
scoring_system epss
scoring_elements 0.82159
published_at 2026-04-01T12:55:00Z
1
value 0.01691
scoring_system epss
scoring_elements 0.8223
published_at 2026-04-13T12:55:00Z
2
value 0.01691
scoring_system epss
scoring_elements 0.82217
published_at 2026-04-08T12:55:00Z
3
value 0.01691
scoring_system epss
scoring_elements 0.82224
published_at 2026-04-09T12:55:00Z
4
value 0.01691
scoring_system epss
scoring_elements 0.82243
published_at 2026-04-11T12:55:00Z
5
value 0.01691
scoring_system epss
scoring_elements 0.82235
published_at 2026-04-12T12:55:00Z
6
value 0.01691
scoring_system epss
scoring_elements 0.82173
published_at 2026-04-02T12:55:00Z
7
value 0.01691
scoring_system epss
scoring_elements 0.82194
published_at 2026-04-04T12:55:00Z
8
value 0.01691
scoring_system epss
scoring_elements 0.8219
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30666
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8625
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8710
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8720
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8743
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8764
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8766
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8769
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8771
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8782
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8783
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8808
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8811
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8813
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8815
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8816
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8819
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8820
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8823
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30666
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30761
22
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986877
reference_id 1986877
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986877
23
reference_url https://security.archlinux.org/AVG-2210
reference_id AVG-2210
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2210
24
reference_url https://security.archlinux.org/AVG-2211
reference_id AVG-2211
reference_type
scores
0
value High
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2211
25
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
26
reference_url https://support.apple.com/en-us/HT212341
reference_id HT212341
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-01-29T17:25:57Z/
url https://support.apple.com/en-us/HT212341
27
reference_url https://access.redhat.com/errata/RHSA-2020:4035
reference_id RHSA-2020:4035
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4035
28
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
29
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30666
risk_score 10.0
exploitability 2.0
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x5us-y2sc-mkg5
215
url VCID-x73g-k7yh-qydd
vulnerability_id VCID-x73g-k7yh-qydd
summary Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-42852.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-42852
reference_id
reference_type
scores
0
value 0.02171
scoring_system epss
scoring_elements 0.84321
published_at 2026-04-13T12:55:00Z
1
value 0.02171
scoring_system epss
scoring_elements 0.84267
published_at 2026-04-02T12:55:00Z
2
value 0.02171
scoring_system epss
scoring_elements 0.84325
published_at 2026-04-12T12:55:00Z
3
value 0.02171
scoring_system epss
scoring_elements 0.84332
published_at 2026-04-11T12:55:00Z
4
value 0.02171
scoring_system epss
scoring_elements 0.84314
published_at 2026-04-09T12:55:00Z
5
value 0.02171
scoring_system epss
scoring_elements 0.84287
published_at 2026-04-07T12:55:00Z
6
value 0.02171
scoring_system epss
scoring_elements 0.84286
published_at 2026-04-04T12:55:00Z
7
value 0.02171
scoring_system epss
scoring_elements 0.84309
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-42852
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-41983
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42852
4
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
5
reference_url http://www.openwall.com/lists/oss-security/2023/11/15/1
reference_id 1
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://www.openwall.com/lists/oss-security/2023/11/15/1
6
reference_url http://seclists.org/fulldisclosure/2023/Oct/19
reference_id 19
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/19
7
reference_url http://seclists.org/fulldisclosure/2023/Oct/22
reference_id 22
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/22
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2271456
reference_id 2271456
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2271456
9
reference_url http://seclists.org/fulldisclosure/2023/Oct/23
reference_id 23
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/23
10
reference_url http://seclists.org/fulldisclosure/2023/Oct/24
reference_id 24
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/24
11
reference_url http://seclists.org/fulldisclosure/2023/Oct/25
reference_id 25
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/25
12
reference_url http://seclists.org/fulldisclosure/2023/Oct/27
reference_id 27
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url http://seclists.org/fulldisclosure/2023/Oct/27
13
reference_url https://www.debian.org/security/2023/dsa-5557
reference_id dsa-5557
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://www.debian.org/security/2023/dsa-5557
14
reference_url https://security.gentoo.org/glsa/202401-33
reference_id GLSA-202401-33
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://security.gentoo.org/glsa/202401-33
15
reference_url https://support.apple.com/en-us/HT213981
reference_id HT213981
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213981
16
reference_url https://support.apple.com/en-us/HT213982
reference_id HT213982
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213982
17
reference_url https://support.apple.com/en-us/HT213984
reference_id HT213984
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213984
18
reference_url https://support.apple.com/kb/HT213984
reference_id HT213984
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/kb/HT213984
19
reference_url https://support.apple.com/en-us/HT213986
reference_id HT213986
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213986
20
reference_url https://support.apple.com/en-us/HT213987
reference_id HT213987
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213987
21
reference_url https://support.apple.com/en-us/HT213988
reference_id HT213988
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://support.apple.com/en-us/HT213988
22
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
23
reference_url https://access.redhat.com/errata/RHSA-2024:2982
reference_id RHSA-2024:2982
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2982
24
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
25
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
26
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
27
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
28
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
29
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
30
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
31
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/
reference_id RPPMOWFYZODONTA3RLZOKSGNR4DELGG2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RPPMOWFYZODONTA3RLZOKSGNR4DELGG2/
32
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/
reference_id S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/S3O7ITSBZDHLBM5OG22K6RZAHRRTGECM/
33
reference_url https://usn.ubuntu.com/6490-1/
reference_id USN-6490-1
reference_type
scores
url https://usn.ubuntu.com/6490-1/
34
reference_url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/
reference_id ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-04-23T13:26:16Z/
url https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZTCZGQPRDAOPP6NK4CIDJKIPMBWD5J7K/
fixed_packages
aliases CVE-2023-42852
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-x73g-k7yh-qydd
216
url VCID-xq1c-h5v5-77bs
vulnerability_id VCID-xq1c-h5v5-77bs
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30952.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30952.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30952
reference_id
reference_type
scores
0
value 0.01244
scoring_system epss
scoring_elements 0.79278
published_at 2026-04-13T12:55:00Z
1
value 0.01244
scoring_system epss
scoring_elements 0.79305
published_at 2026-04-11T12:55:00Z
2
value 0.01244
scoring_system epss
scoring_elements 0.79289
published_at 2026-04-12T12:55:00Z
3
value 0.01279
scoring_system epss
scoring_elements 0.79547
published_at 2026-04-04T12:55:00Z
4
value 0.01279
scoring_system epss
scoring_elements 0.79525
published_at 2026-04-02T12:55:00Z
5
value 0.01279
scoring_system epss
scoring_elements 0.79563
published_at 2026-04-08T12:55:00Z
6
value 0.01279
scoring_system epss
scoring_elements 0.79535
published_at 2026-04-07T12:55:00Z
7
value 0.01279
scoring_system epss
scoring_elements 0.79519
published_at 2026-04-01T12:55:00Z
8
value 0.01279
scoring_system epss
scoring_elements 0.7957
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30952
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30934
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30936
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30951
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30952
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30953
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30954
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30984
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22594
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22637
11
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
12
reference_url http://www.openwall.com/lists/oss-security/2022/01/21/2
reference_id 2
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url http://www.openwall.com/lists/oss-security/2022/01/21/2
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2044538
reference_id 2044538
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2044538
14
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/
reference_id 7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/
15
reference_url https://www.debian.org/security/2022/dsa-5060
reference_id dsa-5060
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://www.debian.org/security/2022/dsa-5060
16
reference_url https://www.debian.org/security/2022/dsa-5061
reference_id dsa-5061
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://www.debian.org/security/2022/dsa-5061
17
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
18
reference_url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/
reference_id HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/
19
reference_url https://support.apple.com/en-us/HT212975
reference_id HT212975
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212975
20
reference_url https://support.apple.com/en-us/HT212976
reference_id HT212976
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212976
21
reference_url https://support.apple.com/en-us/HT212978
reference_id HT212978
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212978
22
reference_url https://support.apple.com/en-us/HT212980
reference_id HT212980
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212980
23
reference_url https://support.apple.com/en-us/HT212982
reference_id HT212982
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2026-03-05T19:17:22Z/
url https://support.apple.com/en-us/HT212982
24
reference_url https://access.redhat.com/errata/RHSA-2022:1777
reference_id RHSA-2022:1777
reference_type
scores
url https://access.redhat.com/errata/RHSA-2022:1777
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/5255-1/
reference_id USN-5255-1
reference_type
scores
url https://usn.ubuntu.com/5255-1/
fixed_packages
aliases CVE-2021-30952
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xq1c-h5v5-77bs
217
url VCID-xqyu-yhx3-f7fq
vulnerability_id VCID-xqyu-yhx3-f7fq
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-40397.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-40397
reference_id
reference_type
scores
0
value 0.01195
scoring_system epss
scoring_elements 0.78835
published_at 2026-04-02T12:55:00Z
1
value 0.01195
scoring_system epss
scoring_elements 0.78864
published_at 2026-04-04T12:55:00Z
2
value 0.01195
scoring_system epss
scoring_elements 0.78846
published_at 2026-04-07T12:55:00Z
3
value 0.01195
scoring_system epss
scoring_elements 0.78871
published_at 2026-04-08T12:55:00Z
4
value 0.01195
scoring_system epss
scoring_elements 0.78877
published_at 2026-04-09T12:55:00Z
5
value 0.01195
scoring_system epss
scoring_elements 0.78901
published_at 2026-04-11T12:55:00Z
6
value 0.01195
scoring_system epss
scoring_elements 0.78885
published_at 2026-04-12T12:55:00Z
7
value 0.01195
scoring_system epss
scoring_elements 0.78875
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-40397
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38133
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38572
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38592
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38594
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38595
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38597
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38599
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38600
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-38611
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39434
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40397
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40451
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2238945
reference_id 2238945
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2238945
16
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
url https://security.gentoo.org/glsa/202401-04
17
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
18
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
19
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
22
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
23
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
24
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2023-40397
risk_score 4.4
exploitability 0.5
weighted_severity 8.8
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xqyu-yhx3-f7fq
218
url VCID-xstk-j7zq-e3bh
vulnerability_id VCID-xstk-j7zq-e3bh
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13558.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13558.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-13558
reference_id
reference_type
scores
0
value 0.00599
scoring_system epss
scoring_elements 0.6935
published_at 2026-04-01T12:55:00Z
1
value 0.00599
scoring_system epss
scoring_elements 0.69417
published_at 2026-04-13T12:55:00Z
2
value 0.00599
scoring_system epss
scoring_elements 0.69423
published_at 2026-04-09T12:55:00Z
3
value 0.00599
scoring_system epss
scoring_elements 0.69446
published_at 2026-04-11T12:55:00Z
4
value 0.00599
scoring_system epss
scoring_elements 0.69431
published_at 2026-04-12T12:55:00Z
5
value 0.00599
scoring_system epss
scoring_elements 0.69362
published_at 2026-04-02T12:55:00Z
6
value 0.00599
scoring_system epss
scoring_elements 0.69378
published_at 2026-04-04T12:55:00Z
7
value 0.00599
scoring_system epss
scoring_elements 0.69357
published_at 2026-04-07T12:55:00Z
8
value 0.00599
scoring_system epss
scoring_elements 0.69407
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-13558
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13558
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1928886
reference_id 1928886
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1928886
5
reference_url https://security.archlinux.org/AVG-1571
reference_id AVG-1571
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1571
6
reference_url https://security.archlinux.org/AVG-1572
reference_id AVG-1572
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1572
7
reference_url https://security.gentoo.org/glsa/202104-03
reference_id GLSA-202104-03
reference_type
scores
url https://security.gentoo.org/glsa/202104-03
8
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
9
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
10
reference_url https://usn.ubuntu.com/4739-1/
reference_id USN-4739-1
reference_type
scores
url https://usn.ubuntu.com/4739-1/
fixed_packages
aliases CVE-2020-13558
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xstk-j7zq-e3bh
219
url VCID-xzgb-egkw-9kdn
vulnerability_id VCID-xzgb-egkw-9kdn
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32888.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-32888.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-32888
reference_id
reference_type
scores
0
value 0.00702
scoring_system epss
scoring_elements 0.7202
published_at 2026-04-04T12:55:00Z
1
value 0.00702
scoring_system epss
scoring_elements 0.72
published_at 2026-04-02T12:55:00Z
2
value 0.00702
scoring_system epss
scoring_elements 0.72046
published_at 2026-04-09T12:55:00Z
3
value 0.00702
scoring_system epss
scoring_elements 0.72034
published_at 2026-04-08T12:55:00Z
4
value 0.00702
scoring_system epss
scoring_elements 0.71995
published_at 2026-04-07T12:55:00Z
5
value 0.00794
scoring_system epss
scoring_elements 0.73935
published_at 2026-04-13T12:55:00Z
6
value 0.00794
scoring_system epss
scoring_elements 0.73961
published_at 2026-04-11T12:55:00Z
7
value 0.00794
scoring_system epss
scoring_elements 0.73943
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-32888
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32886
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32888
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32923
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32933
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42863
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-48503
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25358
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25360
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25361
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25362
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-25363
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-42833
14
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2140501
reference_id 2140501
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2140501
16
reference_url http://www.openwall.com/lists/oss-security/2022/11/04/4
reference_id 4
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url http://www.openwall.com/lists/oss-security/2022/11/04/4
17
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://security.gentoo.org/glsa/202305-32
18
reference_url https://support.apple.com/en-us/HT213443
reference_id HT213443
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213443
19
reference_url https://support.apple.com/en-us/HT213444
reference_id HT213444
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213444
20
reference_url https://support.apple.com/en-us/HT213445
reference_id HT213445
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213445
21
reference_url https://support.apple.com/en-us/HT213446
reference_id HT213446
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213446
22
reference_url https://support.apple.com/en-us/HT213486
reference_id HT213486
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213486
23
reference_url https://support.apple.com/en-us/HT213487
reference_id HT213487
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213487
24
reference_url https://support.apple.com/en-us/HT213488
reference_id HT213488
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2025-05-05T15:00:30Z/
url https://support.apple.com/en-us/HT213488
25
reference_url https://access.redhat.com/errata/RHSA-2023:2256
reference_id RHSA-2023:2256
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2256
26
reference_url https://access.redhat.com/errata/RHSA-2023:2834
reference_id RHSA-2023:2834
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:2834
27
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
28
reference_url https://usn.ubuntu.com/5730-1/
reference_id USN-5730-1
reference_type
scores
url https://usn.ubuntu.com/5730-1/
fixed_packages
aliases CVE-2022-32888
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-xzgb-egkw-9kdn
220
url VCID-y388-97uu-3qax
vulnerability_id VCID-y388-97uu-3qax
summary webkit: Processing maliciously crafted web content may lead to memory corruption
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54534.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-54534.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-54534
reference_id
reference_type
scores
0
value 0.0107
scoring_system epss
scoring_elements 0.77728
published_at 2026-04-13T12:55:00Z
1
value 0.0107
scoring_system epss
scoring_elements 0.77702
published_at 2026-04-04T12:55:00Z
2
value 0.0107
scoring_system epss
scoring_elements 0.77685
published_at 2026-04-07T12:55:00Z
3
value 0.0107
scoring_system epss
scoring_elements 0.77713
published_at 2026-04-08T12:55:00Z
4
value 0.0107
scoring_system epss
scoring_elements 0.77719
published_at 2026-04-09T12:55:00Z
5
value 0.0107
scoring_system epss
scoring_elements 0.77745
published_at 2026-04-11T12:55:00Z
6
value 0.0107
scoring_system epss
scoring_elements 0.77729
published_at 2026-04-12T12:55:00Z
7
value 0.01113
scoring_system epss
scoring_elements 0.78113
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-54534
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54534
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/121837
reference_id 121837
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121837
5
reference_url https://support.apple.com/en-us/121839
reference_id 121839
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121839
6
reference_url https://support.apple.com/en-us/121843
reference_id 121843
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121843
7
reference_url https://support.apple.com/en-us/121844
reference_id 121844
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121844
8
reference_url https://support.apple.com/en-us/121845
reference_id 121845
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121845
9
reference_url https://support.apple.com/en-us/121846
reference_id 121846
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-13T18:42:40Z/
url https://support.apple.com/en-us/121846
10
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2333846
reference_id 2333846
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2333846
11
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
12
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
13
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
14
reference_url https://access.redhat.com/errata/RHSA-2024:9553
reference_id RHSA-2024:9553
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9553
15
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
16
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
17
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
18
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
19
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
20
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-54534
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y388-97uu-3qax
221
url VCID-y4mh-xhvx-yubd
vulnerability_id VCID-y4mh-xhvx-yubd
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9850.json
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9850.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9850
reference_id
reference_type
scores
0
value 0.82826
scoring_system epss
scoring_elements 0.99236
published_at 2026-04-01T12:55:00Z
1
value 0.82826
scoring_system epss
scoring_elements 0.99247
published_at 2026-04-12T12:55:00Z
2
value 0.82826
scoring_system epss
scoring_elements 0.99245
published_at 2026-04-08T12:55:00Z
3
value 0.82826
scoring_system epss
scoring_elements 0.99246
published_at 2026-04-13T12:55:00Z
4
value 0.82826
scoring_system epss
scoring_elements 0.99238
published_at 2026-04-02T12:55:00Z
5
value 0.82826
scoring_system epss
scoring_elements 0.9924
published_at 2026-04-04T12:55:00Z
6
value 0.82826
scoring_system epss
scoring_elements 0.99244
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9850
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13753
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9802
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9803
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9805
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9806
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9807
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9843
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9850
10
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879568
reference_id 1879568
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879568
12
reference_url https://security.archlinux.org/ASA-202007-1
reference_id ASA-202007-1
reference_type
scores
url https://security.archlinux.org/ASA-202007-1
13
reference_url https://security.archlinux.org/AVG-1203
reference_id AVG-1203
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1203
14
reference_url https://security.gentoo.org/glsa/202007-11
reference_id GLSA-202007-11
reference_type
scores
url https://security.gentoo.org/glsa/202007-11
15
reference_url https://access.redhat.com/errata/RHSA-2020:4451
reference_id RHSA-2020:4451
reference_type
scores
url https://access.redhat.com/errata/RHSA-2020:4451
16
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
17
reference_url https://usn.ubuntu.com/4422-1/
reference_id USN-4422-1
reference_type
scores
url https://usn.ubuntu.com/4422-1/
fixed_packages
aliases CVE-2020-9850
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y4mh-xhvx-yubd
222
url VCID-y77v-hwy6-hfhy
vulnerability_id VCID-y77v-hwy6-hfhy
summary webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-40779.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-40779
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07846
published_at 2026-04-13T12:55:00Z
1
value 0.0003
scoring_system epss
scoring_elements 0.08614
published_at 2026-04-12T12:55:00Z
2
value 0.0003
scoring_system epss
scoring_elements 0.08638
published_at 2026-04-11T12:55:00Z
3
value 0.0003
scoring_system epss
scoring_elements 0.0864
published_at 2026-04-09T12:55:00Z
4
value 0.0003
scoring_system epss
scoring_elements 0.08616
published_at 2026-04-08T12:55:00Z
5
value 0.0003
scoring_system epss
scoring_elements 0.08543
published_at 2026-04-07T12:55:00Z
6
value 0.0003
scoring_system epss
scoring_elements 0.08625
published_at 2026-04-04T12:55:00Z
7
value 0.0003
scoring_system epss
scoring_elements 0.08573
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-40779
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40779
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://support.apple.com/en-us/120908
reference_id 120908
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120908
5
reference_url https://support.apple.com/en-us/120909
reference_id 120909
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120909
6
reference_url https://support.apple.com/en-us/120911
reference_id 120911
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120911
7
reference_url https://support.apple.com/en-us/120913
reference_id 120913
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120913
8
reference_url https://support.apple.com/en-us/120914
reference_id 120914
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120914
9
reference_url https://support.apple.com/en-us/120915
reference_id 120915
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120915
10
reference_url https://support.apple.com/en-us/120916
reference_id 120916
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/120916
11
reference_url http://seclists.org/fulldisclosure/2024/Jul/15
reference_id 15
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/15
12
reference_url http://seclists.org/fulldisclosure/2024/Jul/16
reference_id 16
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/16
13
reference_url http://seclists.org/fulldisclosure/2024/Jul/17
reference_id 17
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/17
14
reference_url http://seclists.org/fulldisclosure/2024/Jul/18
reference_id 18
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/18
15
reference_url http://seclists.org/fulldisclosure/2024/Jul/21
reference_id 21
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/21
16
reference_url http://seclists.org/fulldisclosure/2024/Jul/22
reference_id 22
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/22
17
reference_url http://seclists.org/fulldisclosure/2024/Jul/23
reference_id 23
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url http://seclists.org/fulldisclosure/2024/Jul/23
18
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2302070
reference_id 2302070
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2302070
19
reference_url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
reference_id apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://www.secpod.com/blog/apple-fixes-multiple-security-vulnerabilities-in-july-2024-updates/
20
reference_url https://support.apple.com/en-us/HT214116
reference_id HT214116
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214116
21
reference_url https://support.apple.com/en-us/HT214117
reference_id HT214117
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214117
22
reference_url https://support.apple.com/en-us/HT214119
reference_id HT214119
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214119
23
reference_url https://support.apple.com/en-us/HT214121
reference_id HT214121
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214121
24
reference_url https://support.apple.com/en-us/HT214122
reference_id HT214122
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214122
25
reference_url https://support.apple.com/en-us/HT214123
reference_id HT214123
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214123
26
reference_url https://support.apple.com/en-us/HT214124
reference_id HT214124
reference_type
scores
0
value 5.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-07-30T18:33:34Z/
url https://support.apple.com/en-us/HT214124
27
reference_url https://access.redhat.com/errata/RHSA-2024:8180
reference_id RHSA-2024:8180
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8180
28
reference_url https://access.redhat.com/errata/RHSA-2024:8492
reference_id RHSA-2024:8492
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8492
29
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
30
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
31
reference_url https://access.redhat.com/errata/RHSA-2024:9646
reference_id RHSA-2024:9646
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9646
32
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
33
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
34
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
35
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
36
reference_url https://usn.ubuntu.com/6996-1/
reference_id USN-6996-1
reference_type
scores
url https://usn.ubuntu.com/6996-1/
fixed_packages
aliases CVE-2024-40779
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-y77v-hwy6-hfhy
223
url VCID-ya13-9pc8-n3ht
vulnerability_id VCID-ya13-9pc8-n3ht
summary Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23222.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23222
reference_id
reference_type
scores
0
value 0.00608
scoring_system epss
scoring_elements 0.69696
published_at 2026-04-13T12:55:00Z
1
value 0.00608
scoring_system epss
scoring_elements 0.69723
published_at 2026-04-11T12:55:00Z
2
value 0.00608
scoring_system epss
scoring_elements 0.69709
published_at 2026-04-12T12:55:00Z
3
value 0.00623
scoring_system epss
scoring_elements 0.70076
published_at 2026-04-02T12:55:00Z
4
value 0.00625
scoring_system epss
scoring_elements 0.70137
published_at 2026-04-04T12:55:00Z
5
value 0.00625
scoring_system epss
scoring_elements 0.70178
published_at 2026-04-09T12:55:00Z
6
value 0.00625
scoring_system epss
scoring_elements 0.70162
published_at 2026-04-08T12:55:00Z
7
value 0.00625
scoring_system epss
scoring_elements 0.70115
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23222
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/118479
reference_id 118479
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/118479
8
reference_url https://support.apple.com/en-us/120304
reference_id 120304
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120304
9
reference_url https://support.apple.com/en-us/120305
reference_id 120305
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120305
10
reference_url https://support.apple.com/en-us/120307
reference_id 120307
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120307
11
reference_url https://support.apple.com/en-us/120309
reference_id 120309
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120309
12
reference_url https://support.apple.com/en-us/120310
reference_id 120310
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120310
13
reference_url https://support.apple.com/en-us/120311
reference_id 120311
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120311
14
reference_url https://support.apple.com/en-us/120339
reference_id 120339
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/120339
15
reference_url https://support.apple.com/en-us/126632
reference_id 126632
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-02-01T05:00:05Z/
url https://support.apple.com/en-us/126632
16
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2259893
reference_id 2259893
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2259893
17
reference_url https://security.gentoo.org/glsa/202407-13
reference_id GLSA-202407-13
reference_type
scores
url https://security.gentoo.org/glsa/202407-13
18
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
19
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
20
reference_url https://access.redhat.com/errata/RHSA-2024:8496
reference_id RHSA-2024:8496
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:8496
21
reference_url https://access.redhat.com/errata/RHSA-2024:9638
reference_id RHSA-2024:9638
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9638
22
reference_url https://access.redhat.com/errata/RHSA-2024:9653
reference_id RHSA-2024:9653
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9653
23
reference_url https://access.redhat.com/errata/RHSA-2024:9679
reference_id RHSA-2024:9679
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9679
24
reference_url https://access.redhat.com/errata/RHSA-2024:9680
reference_id RHSA-2024:9680
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9680
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
26
reference_url https://usn.ubuntu.com/6631-1/
reference_id USN-6631-1
reference_type
scores
url https://usn.ubuntu.com/6631-1/
fixed_packages
aliases CVE-2024-23222
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ya13-9pc8-n3ht
224
url VCID-ydxt-4h1z-1kh8
vulnerability_id VCID-ydxt-4h1z-1kh8
summary webkitgtk: A malicious website may cause unexpected cross-origin behavior
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23271.json
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2024-23271.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2024-23271
reference_id
reference_type
scores
0
value 0.00065
scoring_system epss
scoring_elements 0.20254
published_at 2026-04-02T12:55:00Z
1
value 0.00084
scoring_system epss
scoring_elements 0.24538
published_at 2026-04-13T12:55:00Z
2
value 0.00084
scoring_system epss
scoring_elements 0.2473
published_at 2026-04-04T12:55:00Z
3
value 0.00084
scoring_system epss
scoring_elements 0.24502
published_at 2026-04-07T12:55:00Z
4
value 0.00084
scoring_system epss
scoring_elements 0.24573
published_at 2026-04-08T12:55:00Z
5
value 0.00084
scoring_system epss
scoring_elements 0.24619
published_at 2026-04-09T12:55:00Z
6
value 0.00084
scoring_system epss
scoring_elements 0.24636
published_at 2026-04-11T12:55:00Z
7
value 0.00084
scoring_system epss
scoring_elements 0.24593
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2024-23271
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23206
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23213
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23222
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23271
6
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 4.6
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
7
reference_url https://support.apple.com/en-us/120304
reference_id 120304
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120304
8
reference_url https://support.apple.com/en-us/120306
reference_id 120306
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120306
9
reference_url https://support.apple.com/en-us/120309
reference_id 120309
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120309
10
reference_url https://support.apple.com/en-us/120311
reference_id 120311
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120311
11
reference_url https://support.apple.com/en-us/120339
reference_id 120339
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/120339
12
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2314696
reference_id 2314696
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2314696
13
reference_url https://support.apple.com/en-us/HT214055
reference_id HT214055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214055
14
reference_url https://support.apple.com/kb/HT214055
reference_id HT214055
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214055
15
reference_url https://support.apple.com/en-us/HT214056
reference_id HT214056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214056
16
reference_url https://support.apple.com/kb/HT214056
reference_id HT214056
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214056
17
reference_url https://support.apple.com/en-us/HT214059
reference_id HT214059
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214059
18
reference_url https://support.apple.com/kb/HT214059
reference_id HT214059
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214059
19
reference_url https://support.apple.com/en-us/HT214060
reference_id HT214060
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214060
20
reference_url https://support.apple.com/kb/HT214060
reference_id HT214060
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214060
21
reference_url https://support.apple.com/en-us/HT214061
reference_id HT214061
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/en-us/HT214061
22
reference_url https://support.apple.com/kb/HT214061
reference_id HT214061
reference_type
scores
0
value 7.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2024-05-01T17:21:25Z/
url https://support.apple.com/kb/HT214061
23
reference_url https://access.redhat.com/errata/RHSA-2024:2126
reference_id RHSA-2024:2126
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:2126
24
reference_url https://access.redhat.com/errata/RHSA-2024:9636
reference_id RHSA-2024:9636
reference_type
scores
url https://access.redhat.com/errata/RHSA-2024:9636
25
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2024-23271
risk_score 2.5
exploitability 0.5
weighted_severity 5.1
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ydxt-4h1z-1kh8
225
url VCID-ygd8-6k3t-quck
vulnerability_id VCID-ygd8-6k3t-quck
summary Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27954.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-27954.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-27954
reference_id
reference_type
scores
0
value 0.00189
scoring_system epss
scoring_elements 0.4075
published_at 2026-04-02T12:55:00Z
1
value 0.00189
scoring_system epss
scoring_elements 0.40725
published_at 2026-04-13T12:55:00Z
2
value 0.00189
scoring_system epss
scoring_elements 0.40778
published_at 2026-04-11T12:55:00Z
3
value 0.00189
scoring_system epss
scoring_elements 0.40702
published_at 2026-04-07T12:55:00Z
4
value 0.00189
scoring_system epss
scoring_elements 0.40752
published_at 2026-04-08T12:55:00Z
5
value 0.00189
scoring_system epss
scoring_elements 0.40759
published_at 2026-04-09T12:55:00Z
6
value 0.00189
scoring_system epss
scoring_elements 0.40743
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-27954
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
12
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
13
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2236844
reference_id 2236844
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2236844
14
reference_url https://security.gentoo.org/glsa/202305-32
reference_id GLSA-202305-32
reference_type
scores
url https://security.gentoo.org/glsa/202305-32
15
reference_url https://support.apple.com/en-us/HT213670
reference_id HT213670
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213670
16
reference_url https://support.apple.com/en-us/HT213671
reference_id HT213671
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213671
17
reference_url https://support.apple.com/en-us/HT213673
reference_id HT213673
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213673
18
reference_url https://support.apple.com/en-us/HT213674
reference_id HT213674
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213674
19
reference_url https://support.apple.com/en-us/HT213676
reference_id HT213676
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213676
20
reference_url https://support.apple.com/en-us/HT213678
reference_id HT213678
reference_type
scores
0
value 6.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
1
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2025-01-29T14:52:16Z/
url https://support.apple.com/en-us/HT213678
21
reference_url https://access.redhat.com/errata/RHSA-2023:6535
reference_id RHSA-2023:6535
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:6535
22
reference_url https://access.redhat.com/errata/RHSA-2023:7055
reference_id RHSA-2023:7055
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:7055
23
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
24
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2023-27954
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ygd8-6k3t-quck
226
url VCID-yjt8-b6qu-m7ag
vulnerability_id VCID-yjt8-b6qu-m7ag
summary
Multiple vulnerabilities have been found in WebkitGTK+, the worst of
	  which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30682.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-30682.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2021-30682
reference_id
reference_type
scores
0
value 0.00369
scoring_system epss
scoring_elements 0.58714
published_at 2026-04-01T12:55:00Z
1
value 0.00369
scoring_system epss
scoring_elements 0.58818
published_at 2026-04-13T12:55:00Z
2
value 0.00369
scoring_system epss
scoring_elements 0.58836
published_at 2026-04-12T12:55:00Z
3
value 0.00369
scoring_system epss
scoring_elements 0.58854
published_at 2026-04-11T12:55:00Z
4
value 0.00369
scoring_system epss
scoring_elements 0.58788
published_at 2026-04-02T12:55:00Z
5
value 0.00369
scoring_system epss
scoring_elements 0.58809
published_at 2026-04-04T12:55:00Z
6
value 0.00369
scoring_system epss
scoring_elements 0.58778
published_at 2026-04-07T12:55:00Z
7
value 0.00369
scoring_system epss
scoring_elements 0.5883
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2021-30682
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1788
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1844
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1871
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30682
6
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1986879
reference_id 1986879
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1986879
7
reference_url https://security.archlinux.org/AVG-2216
reference_id AVG-2216
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2216
8
reference_url https://security.archlinux.org/AVG-2217
reference_id AVG-2217
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-2217
9
reference_url https://security.gentoo.org/glsa/202202-01
reference_id GLSA-202202-01
reference_type
scores
url https://security.gentoo.org/glsa/202202-01
10
reference_url https://access.redhat.com/errata/RHSA-2021:4381
reference_id RHSA-2021:4381
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:4381
11
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
fixed_packages
aliases CVE-2021-30682
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yjt8-b6qu-m7ag
227
url VCID-yq37-cpqv-nyer
vulnerability_id VCID-yq37-cpqv-nyer
summary
Multiple vulnerabilities have been found in Chromium and Google
	  Chrome, the worst of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0108.json
reference_id
reference_type
scores
0
value 6.5
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2022-0108.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2022-0108
reference_id
reference_type
scores
0
value 0.00333
scoring_system epss
scoring_elements 0.5602
published_at 2026-04-01T12:55:00Z
1
value 0.00333
scoring_system epss
scoring_elements 0.5613
published_at 2026-04-07T12:55:00Z
2
value 0.00333
scoring_system epss
scoring_elements 0.5615
published_at 2026-04-04T12:55:00Z
3
value 0.00333
scoring_system epss
scoring_elements 0.56181
published_at 2026-04-08T12:55:00Z
4
value 0.00333
scoring_system epss
scoring_elements 0.56186
published_at 2026-04-09T12:55:00Z
5
value 0.00333
scoring_system epss
scoring_elements 0.56197
published_at 2026-04-11T12:55:00Z
6
value 0.00333
scoring_system epss
scoring_elements 0.56173
published_at 2026-04-12T12:55:00Z
7
value 0.00333
scoring_system epss
scoring_elements 0.56157
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2022-0108
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30558
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30558
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37956
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37956
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37957
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37957
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37958
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37958
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37959
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37959
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37961
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37961
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37962
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37962
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37963
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37963
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37964
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37964
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37965
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37965
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37966
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37966
13
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37967
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37967
14
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37968
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37968
15
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37969
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37969
16
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37970
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37970
17
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37971
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37971
18
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37972
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37972
19
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37973
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37973
20
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37974
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37974
21
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37975
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37975
22
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37976
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37976
23
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37977
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37977
24
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37978
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37978
25
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37979
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37979
26
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37980
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37980
27
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37981
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37981
28
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37982
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37982
29
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37983
30
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37984
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37984
31
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37985
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37985
32
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37986
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37986
33
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37987
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37987
34
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37988
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37988
35
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37989
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37989
36
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37990
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37990
37
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37991
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37991
38
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37992
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37992
39
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37993
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37993
40
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37994
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37994
41
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37995
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37995
42
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37996
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37996
43
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37997
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37997
44
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37998
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37998
45
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37999
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-37999
46
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38000
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38000
47
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38001
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38001
48
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38002
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38002
49
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38003
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38003
50
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38004
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38004
51
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38005
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38005
52
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38006
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38006
53
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38007
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38007
54
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38008
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38008
55
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38009
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38009
56
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38010
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38010
57
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38011
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38011
58
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38012
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38012
59
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38013
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38013
60
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38014
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38014
61
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38015
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38015
62
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38016
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38016
63
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38017
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38017
64
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38018
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38018
65
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38019
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38019
66
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38020
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38020
67
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38021
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38021
68
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38022
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-38022
69
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4052
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4052
70
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4053
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4053
71
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4054
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4054
72
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4055
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4055
73
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4056
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4056
74
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4057
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4057
75
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4058
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4058
76
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4059
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4059
77
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4061
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4061
78
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4062
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4062
79
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4063
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4063
80
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4064
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4064
81
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4065
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4065
82
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4066
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4066
83
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4067
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4067
84
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4068
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4068
85
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4078
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4078
86
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4079
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4079
87
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4098
88
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4099
89
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4100
90
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4101
91
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4102
92
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4316
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4316
93
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4317
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4317
94
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4318
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4318
95
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4319
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4319
96
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4320
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4320
97
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4321
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4321
98
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4322
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4322
99
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0096
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0096
100
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0097
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0097
101
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0098
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0098
102
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0099
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0099
103
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0100
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0100
104
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0101
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0101
105
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0102
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0102
106
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0103
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0103
107
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0104
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0104
108
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0105
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0105
109
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0106
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0106
110
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0107
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0107
111
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0108
112
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0109
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0109
113
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0110
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0110
114
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0111
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0111
115
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0112
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0112
116
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0113
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0113
117
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0114
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0114
118
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0115
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0115
119
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0116
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0116
120
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0117
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0117
121
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0118
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0118
122
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0120
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0120
123
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32885
124
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4924
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4924
125
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4925
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4925
126
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27932
127
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27954
128
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28198
129
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28205
130
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32370
131
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32393
132
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32435
133
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-35074
134
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2037469
reference_id 2037469
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2037469
135
reference_url https://security.gentoo.org/glsa/202201-02
reference_id GLSA-202201-02
reference_type
scores
url https://security.gentoo.org/glsa/202201-02
136
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
137
reference_url https://usn.ubuntu.com/6061-1/
reference_id USN-6061-1
reference_type
scores
url https://usn.ubuntu.com/6061-1/
fixed_packages
aliases CVE-2022-0108
risk_score 3.0
exploitability 0.5
weighted_severity 5.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-yq37-cpqv-nyer
228
url VCID-ytw3-vz3r-rqdd
vulnerability_id VCID-ytw3-vz3r-rqdd
summary Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32439.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2023-32439.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-32439
reference_id
reference_type
scores
0
value 0.0116
scoring_system epss
scoring_elements 0.78545
published_at 2026-04-02T12:55:00Z
1
value 0.0116
scoring_system epss
scoring_elements 0.78587
published_at 2026-04-13T12:55:00Z
2
value 0.0116
scoring_system epss
scoring_elements 0.78575
published_at 2026-04-04T12:55:00Z
3
value 0.0116
scoring_system epss
scoring_elements 0.78557
published_at 2026-04-07T12:55:00Z
4
value 0.0116
scoring_system epss
scoring_elements 0.78584
published_at 2026-04-08T12:55:00Z
5
value 0.0116
scoring_system epss
scoring_elements 0.7859
published_at 2026-04-09T12:55:00Z
6
value 0.0116
scoring_system epss
scoring_elements 0.78614
published_at 2026-04-11T12:55:00Z
7
value 0.0116
scoring_system epss
scoring_elements 0.78596
published_at 2026-04-12T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-32439
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32439
3
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
4
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2218640
reference_id 2218640
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2218640
5
reference_url https://security.gentoo.org/glsa/202401-04
reference_id GLSA-202401-04
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://security.gentoo.org/glsa/202401-04
6
reference_url https://support.apple.com/en-us/HT213811
reference_id HT213811
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213811
7
reference_url https://support.apple.com/en-us/HT213813
reference_id HT213813
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213813
8
reference_url https://support.apple.com/en-us/HT213814
reference_id HT213814
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213814
9
reference_url https://support.apple.com/kb/HT213814
reference_id HT213814
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/kb/HT213814
10
reference_url https://support.apple.com/en-us/HT213816
reference_id HT213816
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/en-us/HT213816
11
reference_url https://support.apple.com/kb/HT213816
reference_id HT213816
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
1
value Attend
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2024-01-09T15:34:08Z/
url https://support.apple.com/kb/HT213816
12
reference_url https://access.redhat.com/errata/RHSA-2023:4201
reference_id RHSA-2023:4201
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4201
13
reference_url https://access.redhat.com/errata/RHSA-2023:4202
reference_id RHSA-2023:4202
reference_type
scores
url https://access.redhat.com/errata/RHSA-2023:4202
14
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
15
reference_url https://usn.ubuntu.com/6264-1/
reference_id USN-6264-1
reference_type
scores
url https://usn.ubuntu.com/6264-1/
fixed_packages
aliases CVE-2023-32439
risk_score 10.0
exploitability 2.0
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ytw3-vz3r-rqdd
229
url VCID-zp51-2hhv-fqhq
vulnerability_id VCID-zp51-2hhv-fqhq
summary
Multiple vulnerabilities have been found in WebKitGTK+, the worst
    of which could result in the arbitrary execution of code.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9951.json
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-9951.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-9951
reference_id
reference_type
scores
0
value 0.01995
scoring_system epss
scoring_elements 0.83565
published_at 2026-04-01T12:55:00Z
1
value 0.01995
scoring_system epss
scoring_elements 0.83631
published_at 2026-04-13T12:55:00Z
2
value 0.01995
scoring_system epss
scoring_elements 0.83643
published_at 2026-04-11T12:55:00Z
3
value 0.01995
scoring_system epss
scoring_elements 0.83636
published_at 2026-04-12T12:55:00Z
4
value 0.01995
scoring_system epss
scoring_elements 0.83578
published_at 2026-04-02T12:55:00Z
5
value 0.01995
scoring_system epss
scoring_elements 0.83592
published_at 2026-04-04T12:55:00Z
6
value 0.01995
scoring_system epss
scoring_elements 0.83594
published_at 2026-04-07T12:55:00Z
7
value 0.01995
scoring_system epss
scoring_elements 0.83618
published_at 2026-04-08T12:55:00Z
8
value 0.01995
scoring_system epss
scoring_elements 0.83626
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-9951
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13543
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-13584
4
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9947
5
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9948
6
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9951
7
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9983
8
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1817
9
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1820
10
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1825
11
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1826
12
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30661
13
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
14
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1901216
reference_id 1901216
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1901216
15
reference_url https://security.archlinux.org/AVG-1293
reference_id AVG-1293
reference_type
scores
0
value Medium
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-1293
16
reference_url https://security.gentoo.org/glsa/202012-10
reference_id GLSA-202012-10
reference_type
scores
url https://security.gentoo.org/glsa/202012-10
17
reference_url https://access.redhat.com/errata/RHSA-2021:1586
reference_id RHSA-2021:1586
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1586
18
reference_url https://access.redhat.com/errata/RHSA-2025:10364
reference_id RHSA-2025:10364
reference_type
scores
url https://access.redhat.com/errata/RHSA-2025:10364
19
reference_url https://usn.ubuntu.com/4648-1/
reference_id USN-4648-1
reference_type
scores
url https://usn.ubuntu.com/4648-1/
fixed_packages
aliases CVE-2020-9951
risk_score 4.0
exploitability 0.5
weighted_severity 7.9
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-zp51-2hhv-fqhq
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:rpm/redhat/webkitgtk4@2.48.3-2%3Farch=el7_9